Security Experts:

More Security Headlines

Google and Spotify announce Forseti, a community-driven collection of open source security tools for Google Cloud Platform (GCP) environments [Read More]
Moscow has requested the extradition of Alexander Vinnik, a Russian national also wanted in the United States for laundering billions of dollars through a Bitcoin exchange he operated. [Read More]
Aqua Security, a Tel Aviv, Israel-based container security startup, has raised $25 million in Series B funding, bringing the total amount raised by the company to $38.5 million. [Read More]
A former German intelligence agent who was also an ex-gay porn actor was Tuesday given a one-year suspended sentence for attempting to share state secrets while pretending to be a jihadist online. [Read More]
The server distributing a version of PC utility CCleaner infected with malware might have been compromised in early July, Avast revealed. [Read More]
DigitalOcean warns users that 1-Click applications running MySQL share a default password. Other cloud providers also affected [Read More]
In response to the massive Equifax breach, New York Governor Andrew Cuomo announced plans to make credit reporting firms comply with the 23 NYCRR 500 cybersecurity regulations. [Read More]
Equifax’s cybersecurity failings, including ignored vulnerability reports and executive credentials up for sale on the dark web, revealed following the breach [Read More]
A newly detailed attack method leverages Microsoft Word documents to gather information on users, but doesn’t use macros, exploits or any other active content to do so. [Read More]
The upcoming Windows 10 Fall Creators Update will bring enhanced privacy controls to both consumers and commercial customers, Microsoft says. [Read More]

SecurityWeek Experts

rss icon

Markus Jakobsson's picture
While 2FA is a big step above and beyond the use of traditional passwords, it is not infallible, and thinking so makes the risk of failure even greater.
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Galina Antova's picture
From the boardroom to the security operations center, lip service can no longer be paid to ICS/critical infrastructure/OT cybersecurity.
Joshua Goldfarb's picture
Benchmarking is about understanding how people use a variety of different products and services, what challenges they use them to address, and how those products and services fit into the organization’s security strategy.
Josh Lefkowitz's picture
Regardless of the extent to which your organization shares information, there’s a lot we can all learn from the WireX botnet takedown.
Rafal Los's picture
Rather than starting with a sound, business-aligned strategy supported by business-executive stakeholders there are far too many security organizations that just choose the “do something” path.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Adam Meyer's picture
Want to hire the best analyst? Then first define what is usable and then focus your search on those characteristics.
Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.
Preston Hogue's picture
Even the most knowledgeable users — the very CISOs and security professionals who may be reading this article — can be duped into taking the bait.