Security Experts:

More Security Headlines

A breach at Avast-owned CCleaner that resulted in over 2 million users downloading malware was a highly targeted attack performed by a sophisticated actor, Avast and Cisco security researchers have discovered. [Read More]
WordPress 4.8.2 patches 9 vulnerabilities, including XSS, SQL injection, path traversal and open redirect issues [Read More]
Joomla patches two vulnerabilities, including a login page flaw that allows attackers to guess admin credentials character by character [Read More]
Equifax advised victims of the recent breach on Twitter to access a fake support website instead of equifaxsecurity2017.com [Read More]
The United States Securities and Exchange Commission (SEC) said a cyber-attack in 2016 may have allowed hackers to profit through trading on non-public information in its EDGAR filing system. [Read More]
FedEx estimates that the recent NotPetya malware attack had an impact of $300 million on the company’s earnings in the latest quarter [Read More]
Iranian hackers target aerospace and energy organizations in the US, Saudi Arabia and South Korea [Read More]
Unprotected AWS cloud storage bucket leaks internal access credentials and other critical data from Viacom [Read More]
Researchers demo aIR-Jumper, a malware that uses infrared (IR) cameras to open a two-way communication channel to air-gapped networks [Read More]
Threat Stack, a Boston based intrusion detection startup, has raised $45 million in a Series C funding, bringing the total raised by the company to more than $70 million. [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
With the sheer volume of threat data continuing to climb at a staggering rate, security teams need to start with the threat – automating how we gather, score and prioritize threat intelligence.
Ashley Arbuckle's picture
MSSPs help alleviate the complexity of maintaining and managing a proliferation of security products and point solutions in order to get their full value.
Jennifer Blatnik's picture
If the rest of the community would give hackers more of a chance before writing them off as evildoers, there would potentially be more incentives for capable people to go into the white hat hacking business.
Alan Cohen's picture
There are different types of segmentation architectures: network centric, hypervisor centers, or distributed. Let’s take a look at each one and review the puts and takes of each approach.
Markus Jakobsson's picture
While 2FA is a big step above and beyond the use of traditional passwords, it is not infallible, and thinking so makes the risk of failure even greater.
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Galina Antova's picture
From the boardroom to the security operations center, lip service can no longer be paid to ICS/critical infrastructure/OT cybersecurity.
Joshua Goldfarb's picture
Benchmarking is about understanding how people use a variety of different products and services, what challenges they use them to address, and how those products and services fit into the organization’s security strategy.
Josh Lefkowitz's picture
Regardless of the extent to which your organization shares information, there’s a lot we can all learn from the WireX botnet takedown.
Rafal Los's picture
Rather than starting with a sound, business-aligned strategy supported by business-executive stakeholders there are far too many security organizations that just choose the “do something” path.