Security Experts:

More Security Headlines

Destructive cyber-attacks are increasing and are usually state-sponsored, analysis shows. Other than a few rare occurrences, most involve anything more than basic tools. [Read More]
Facebook, GitHub and the Ford Foundation donate a total of $300,000 to the Internet Bug Bounty (IBB) to help expand the program [Read More]
British man said to be the hacker BestBuy admitted in a German court that he used the Mirai malware to hijack the routers of Deutsche Telekom customers [Read More]
Russia's parliament has voted to outlaw web tools that allow internet users to sidestep official bans of certain websites, the nation's latest effort to tighten controls of online services. [Read More]
Schneider Electric was informed by a researcher that its Trio TView software uses a version of Java from 2011 affected by over 360 vulnerabilities [Read More]
Cybercriminals are testing a new component that can help the Emotet Trojan spread on internal networks [Read More]
A massive botnet that remained under the radar for the past five years managed to infect around half a million computers and allows operators to “execute anything on the infected host,” ESET researchers warn. [Read More]
Researcher tricks Symantec into revoking certificates based on forged private keys – Comodo did not fall for the same trick [Read More]
A Russian man this week was sentenced to five years in prison for his involvement in the development and maintenance of the Citadel banking malware. [Read More]
Cisco's Midyear Cybersecurity Report aims to help defenders discover the latest cybersecurity vulnerabilities and improve their ability to detect threats and prevent attacks. [Read More]

SecurityWeek Experts

rss icon

Michael Adler's picture
Security analysts are faced with an overwhelming number of alerts to investigate across a widening array of endpoints, computing platforms and devices. How should they prioritize security alerts?
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Oliver Rochford's picture
Security automation is highly desirable. But this desire has been inhibited by doubt about the accuracy of the detection of threats, and fear of the consequences of automating the containment or mitigation responses.
Travis Greene's picture
While it’s easy to rely on metrics that are readily available, how does one determine which metrics are actually a measure of security success as it pertains to the overall business priorities?
Preston Hogue's picture
The problem with the CISO role today is that it holds a C-level title but may not always be at the C-level. So how does our CISO profession continue to evolve and gain that seat?
Marc Solomon's picture
Scaling your operations allows you to get more from these investments and demonstrate even greater value to the organization – and you already have what you need to get going.
Ashley Arbuckle's picture
Many organizations are not achieving the full benefits of digital transformation because they lack a comprehensive security program.
Jennifer Blatnik's picture
Whether they come from a technical, business or even military background, all CISOs experience a number of personal and professional roadblocks on a daily basis that challenge the ultimate success of their company’s security.
Jim Ivers's picture
These recommendations will help your organization reduce risk and save real money on the cost of resolving defects. It is not often you get such a clear win-win scenario.
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.