Security Experts:

More Security Headlines

Vera's new Multi-Factor Authentication offering adds strong authentication to corporate data wherever it travels, and allows MFA to be limited to specified data. [Read More]
Qatar said Wednesday it had begun an inquiry into an unprecedented security breach by hackers who posted fake news stories attributed to its ruler on highly sensitive regional political issues. [Read More]
Several flaws, including ones rated critical, found in Rockwell Automation’s Allen-Bradley MicroLogix PLCs. Patches available only for some devices [Read More]
In a cyber intrusion dubbed Operation Cobalt Kitty, the OceanLotus hacking group -- otherwise known as APT32 -- played cat-and-mouse with a security firm that was tracking its every move. [Read More]
Trend Micro patches half a dozen vulnerabilities in its ServerProtect for Linux product [Read More]
Google researcher Tavis Ormandy releases tool for porting Windows DLLs to Linux to improve fuzzing - ports Windows Defender as demo [Read More]
Qatar said Wednesday its official state news agency had been hacked by an 'unknown entity', and subsequently carried false remarks attributed to the country's Emir, Sheikh Tamim bin Hamad Al-Thani. [Read More]
A bug in the Twitter social network allowed an attacker to post tweets as a different user, without having access to the victim’s account. [Read More]
A new behavioral authentication product announced by security firm Preempt allows optional multi-factor authentication (MFA), based on user behavior, on any application. [Read More]
Attackers can remotely hijack millions of systems using malicious subtitle files and vulnerabilities in popular media players [Read More]

SecurityWeek Experts

rss icon

Galina Antova's picture
The security risk to Industrial Control Systems (ICS) networks is systemic and not determined by vulnerabilities alone.
Preston Hogue's picture
Defenders need a new type of counterinsurgent security that can move out into the jungle to protect users and sensitive data against attackers who disguise their exploits with the very encryption that we think keeps us safe.
Marie Hattar's picture
Understanding how well (or not) websites and networks deal with the unexpected spikes in inbound traffic is the first step in dealing with DDoS attacks.
Danelle Au's picture
When a vendor comes in for a presentation and, after only a few minutes, claims to know precisely what your challenges are and how to solve them, that’s a major red flag for the confident CISO.
Marc Solomon's picture
To harness the power embedded in disparate sources of threat data requires aggregating it and translating it into a uniform format for analysis and action.
Ashley Arbuckle's picture
In a globally interconnected world, knowledge-based economies are shaping our future, and vendor relationships are critical to success.
Travis Greene's picture
But choosing to become a black hat hacker is not without risk. If you’re a budding hacker, consider these downsides...
Torsten George's picture
Hackers are exploiting known vulnerabilities and are betting on the fact that organizations don’t know how to fix what really matters.
Steven Grossman's picture
President Trump's cybersecurity executive order touches on activities that indirectly but significantly impact government agencies’ cyber risk posture.
Barak Perelman's picture
It’s a generally known fact that most Industrial Control System (ICS) environments were not built with cyber security in mind because they were designed before the cyber threat existed.