Security Experts:

More Security Headlines

Researchers at Palo Alto Networks disrupted a cyberespionage campaign conducted by an Iranian threat actor [Read More]
Critical flaws affecting over two dozen Symantec and Norton products can be exploited for remote code execution [Read More]
A report published by Trend Micro analyzes the motivations of various types of threat actors that target the mining industry. [Read More]
Germany approved new measures to rein in the activities of its foreign intelligence agency after a scandal over improper collusion with the NSA. [Read More]
A malicious photo and video stealing mobile application targeting Android users managed to trick the Google Bouncer protection system and slip into the Google Play. [Read More]
LevelDropper was distributed via Google Play and can silently root the Android devices it has been installed on. [Read More]
Attackers were using the Cerber ransomware in a massive attack targeting users of Office 365. [Read More]
There are two primary security concerns over the 'Brexit'. Firstly that corporate security defenses will be weakened, and secondly that international threat intelligence sharing with Europe will diminish. [Read More]
Android malware designed to steal sensitive information delivered to European users via smishing campaigns [Read More]
Over 25,000 compromised CCTV devices have been used to launch powerful DDoS attacks [Read More]

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
Analytics is becoming ever more important, and in my opinion, it is an important part of the future of information security.
David Holmes's picture
The portion of encrypted traffic keeps rising, so IT security administrators will be forced to do more SSL decryption if they are to get any value at all out of their fancy security tools.
Travis Greene's picture
While Identity and access management (IAM) is a mature discipline supporting internal employee access to applications, what is the future of IAM in support of end customer interactions?
Rafal Los's picture
With limited resources at your disposal, you as the security leader should work hard to make your team as efficient as possible.
Wade Williamson's picture
Collecting security data is relatively easy – the value of security analytics solutions will rest in how well they reduce that data into answers.
Adam Meyer's picture
Each area of threat intelligence has a different scope of mission, which by default would require a different set of tools and analyst background.
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
Torsten George's picture
Google Dorking can be used to identify vulnerable systems and trace them to a specific place on the Internet.
Ashley Arbuckle's picture
Regardless of what industry you’re in, your ability to successfully compete in the digital economy requires the ability to securely innovate.
Danelle Au's picture
If your security program is focused on reacting to news of the last data breach, you’ve all but ensured that you’ll fall victim to the next data breach.