Security Experts:

More Security Headlines

Lenovo releases new version of System Update software to address local privilege escalation vulnerabilities found by IOActive researcher
Pearson VUE says attackers used a piece of malware to access user data from its PCM certification management system
Dell ships PCs with pre-installed self-signed root certificate that poses serious security and privacy risks
A piece of adware/malware dubbed Vonteera adds certificates from security firms to the “untrusted” list to disable anti-malware products
High-profile cyber-attacks will help drive growth in the oil and gas security and service market, which is estimated to grow from $26.3 billion in 2015 to $33.9 billion by 2020.
Man and woman suspected of operating and Cryptex Reborn malware services arrested by UK authorities.
Belgium announced that it will become a sponsoring nation for the NATO Cooperative Cyber Defence Centre of Excellence.
TrueCrypt is plagued by vulnerabilities, but the product is safer than initially reported, shows a recent audit commissioned by the German government.
Researcher says it took United Airlines nearly 6 months to patch a serious vulnerability exposing flight reservations.
Encryption can be a terrorist's tool. But it's also a key for those hunting attackers, and for many others.

SecurityWeek Experts

rss icon

Alastair Paterson's picture
Cyber Threat Intelligence (CTI) is critical for organizations that want to gain a comprehensive, tailored and relevant view of the potential threats and types of attackers that could be targeting them.
Marc Solomon's picture
The Internet of Everything is transforming our world and creating more opportunities for attackers as modern networks and their components constantly evolve and spawn new attack vectors.
Travis Greene's picture
The challenge in Information Security is recognizing how biases affect our judgment in evaluating and responding to threats and taking steps to mitigate them.
Danelle Au's picture
Attackers are thinking outside the box, using sophisticated breach methods and taking advantage of a very collaborative ecosystem. Perhaps it’s time to supplement all our security defenses with a hacker-centric security paradigm.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Jay Schulman's picture
The ability to recruit the right person for an application security role who can also find the flaws is a struggle for many organizations. These job openings rarely get filled.
David Holmes's picture
Ron Rivest, the inventor of RC4, has improved the RC4 algorithm by adding a third index variable k and moving i through the array more quickly. This new, improved RC4 is called Spritz.
Torsten George's picture
The DHS initiated the Continuous Diagnostics and Mitigation program to safeguard and secure Federal Information Technology networks. But can the DHS CDM program really strengthen the security posture of government networks?
Joshua Goldfarb's picture
Incident response is about taking action on those informed decisions. Once a threat is understood, it should be contained and remediated and security teams should respond quickly to minimize or eliminate damage to the organization.
Jason Polancich's picture
Companies that engage in periodic or annual cyber risk assessments and feel comfortable with results are flirting with disappointment - and maybe even disaster.