Security Experts:

More Security Headlines

Wi-Fi thermostats developed by UK-based company Heatmiser are plagued by several vulnerabilities that can be exploited remotely by a malicious actor, a researcher reported.
Representatives from European banks have signed a memorandum of understanding (MOU) with Europol in an effort to enhance cooperation in the fight against cybercrime.
A new survey from the Cloud Security Alliance found many IT and security pros may be in the dark about the true number of cloud apps used in their organization.
The FBI vowed to widen a probe into the massive hacking of naked celebrity photos if necessary, after new reported leaks including nude shots of Kim Kardashian.
The group was allegedly involved in withdrawing hundreds of thousands of dollars from ATMs in Spain as part of a global cyber-fraud operation
In a recent survey, 52 percent of respondents said they had to scale back on the security protections used on mobile devices in order to boost employee productivity.
IBM has opened a new cloud resiliency center designed to help organizations protect their services from disruptions.
A researcher has identified a series of vulnerabilities on a Yahoo service that ultimately allowed him to gain root access to one of the company's servers.
Duo Security, a provider of cloud-based two-factor authentication solutions, has raised $12 million in Series B funding, led by venture capital firm Benchmark.
CloudFlare's Keyless SSL innovation allows customers to take advantage of the company's solutions without ever having to hand over their private SSL keys.

SecurityWeek Experts

rss icon

Wade Williamson's picture
As we build more accessible, scalable, and efficient computing models, we likewise open ourselves up to attacks that are likewise more accessible, scalable and efficient.
Marcus Ranum's picture
A few years ago, there was a bit of discussion about improving security. A number of researchers' systems and faculty systems had been compromised, and “something must be done” - but what?
Marc Solomon's picture
Thanks to significant technological advances what we can do is use knowledge of the past and the present to drive a desired future outcome. That capability is extremely important for better security given today’s threat landscape and the vicious cycle defenders face.
Adam Ely's picture
At the end of the day, the kill switch will not only decrease the amount of people mugged for their phones because there is little net value in the device itself, but it will also provide individuals with the means to wipe the device of personal information.
Joshua Goldfarb's picture
Although it may be tempting to envision a world where the analyst has been fully automated, this does not seem particularly reasonable.
Pat Calhoun's picture
Being connected is critical and all the elements of an organization’s security platform should work in concert together to provide adaptive security for the entire environment.
James McFarlin's picture
With risks to national and economic security increasing, other avenues of cyber defense are receiving attention. Improving resilience and the promising application of predictive analysis to the prevention of cyberattacks before they occur are two such areas
Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Travis Greene's picture
If you can’t interpret user activity with the context of identity and what is normal behavior, your organization may be living with a false sense of security, providing a significant window of opportunity for attackers.
Mark Hatton's picture
it’s hard to build continuity under inconsistent leadership. It’s also really hard to beat the hackers when the person responsible for keeping them at bay has less job security than an NFL coach with a losing record.