Security Experts:

More Security Headlines

When UK newspaper The Times ran a headline, 'Everyone has been hacked, say police', it leaves the question, is this just more scaremongering or a true reflection on the state of security? [Read More]
The notorious Cobalt hackers are now targeting banks themselves, instead of bank customers, according to Trend Micro. [Read More]
The United States charged an Iranian with hacking into HBO, stealing scripts and plot summaries for "Games of Thrones," and trying to extort $6 million in Bitcoin out of the network. [Read More]
The final version of the ‘OWASP Top 10 - 2017’ has been released, and CSRF and unvalidated redirects didn’t make the list [Read More]
Intel finds several vulnerabilities in management and security technology shipped with processors present in millions of devices [Read More]
Researchers discovered new Android malware apparently being used by the North Korea-linked Lazarus group to target users in South Korea [Read More]
Address Space Layout Randomization (ASLR) isn’t properly applied on versions of Microsoft Windows 8 and newer. [Read More]
Secureworks releases two open source tools, Flowsynth and Dalton, for testing intrusion detection system (IDS) rules [Read More]
A crypto vulnerability affecting F5’s BIG-IP products can be exploited for recovering encrypted data and MitM attacks [Read More]
Microsoft engineers appear to have manually patched a 17 year-old vulnerability in Office, instead of altering the source code of the vulnerable component, ACROS Security researchers say. [Read More]

SecurityWeek Experts

rss icon

Lance Cottrell's picture
Passive Information Leakage (PIL) is one of the least known and most difficult forms of data lost to prevent, and is little understood, primarily because it cannot be addressed through conventional security practices.
Ashley Arbuckle's picture
Here are five recommendations that can help you, as an IT security professional, proactively work in partnership with your OT counterparts to protect the business better.
Joshua Goldfarb's picture
Security teams have given up on building their workflow around a small number of “silver bullets” that claim to solve most of their problems
Preston Hogue's picture
Working closely with business groups throughout the process of due diligence fulfills the CISO’s responsibilities and creates a more security-savvy business.
Dan Cornell's picture
As you start to get an idea of what your application portfolio looks like, you then need to start determining the specific risks that applications can expose your organization to.
Josh Lefkowitz's picture
It’s crucial to recognize that 2018 will very likely be yet another year of increasingly complex and damaging threats and incidents, which is why we must always build upon and further enhance our intelligence strategies.
Adam Meyer's picture
If your threat intelligence isn’t practical, it’s not really useful. Here are a few examples of practical questions you can ask your threat analyst team.
Travis Greene's picture
The cybersecurity community needs to identify where untapped resources exist in order to move beyond traditional industry practices and contend with this imbalance.
Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.
Jim Ivers's picture
Why are even the most security-conscious organizations being compromised, and what does it mean for everyone else?