Security Experts:

More Security Headlines

Siemens released version 7.3 of the SIMATIC WinCC SCADA system to address several vulnerabilities, most of which can be exploited remotely.
Many organizations still haven't patched their installations of VMware to address the Heartbleed vulnerability, CloudPhysics reported.
Starting with Firefox 31, the malware detection mechanism integrated into the Web browser has been expanded to include downloaded files, Mozilla announced on Wednesday.
The European Court of Human Rights (ECHR) ruled that a Latvian man suspected of being involved in the creation of the Gozi banking Trojan would not be exposed to a real risk of ill-treatment if he were to be extradited to the United States.
UK Travel Company W3 Limited was fined £150,000 for violating the Data Protection Act after hackers stole details of 1.1 Million payment cards.
ThreatStream announced that Hugh Njemanze, former co-founder and CTO of ArcSight, has take the role as chief executive officer.
According to new research from Incapsula, 34.3 percent of all the fake Googlebots identified were overtly malicious, with 23.5 percent of these being used for Layer 7 DDoS attacks.
The White House chief of staff and his German counterpart met Tuesday amid a serious rift over allegations of US spying.
A large number of websites have been compromised by cybercriminals who are exploiting a recently patched security hole the popular MailPoet newsletter plugin for WordPress.
The cyber-crime crew was able to take over some 1,600 StubHub user accounts as part of their scheme, authorities said.

SecurityWeek Experts

rss icon

Danelle Au's picture
Enterprises can gain tremendous competitive advantages by having IT focus on the things that matter – users and information rather than infrastructure maintenance and building.
Jon-Louis Heimerl's picture
Cybercrime “case studies” are always impersonal, right? Would you get more out of specific stories of individuals caught in the cross hairs instead of corporate entities?
Pat Calhoun's picture
The need for extreme network protection may be the driving force behind your decision to invest in a next-generation firewall (NGFW), but your enterprise also has other factors to consider.
Torsten George's picture
When an organization is solely focused on strengthening its compliance posture to pass an audit, they primarily look at control failures and gaps and try to mitigate them.
Mark Hatton's picture
You need to identify your security shortcomings before someone else does. Simulate attacks and tests to associate known vulnerabilities, previous attack patterns, and security/network data to identify potential attack paths to your company’s most important data.
Marc Solomon's picture
To help cybersecurity professionals cut through the hype and gain a better understanding of what to expect as the Internet of Everything continues to evolve, these top 10 observations might help.
Adam Ely's picture
Yesterday’s device management approach does not work in a BYOD world. The end users are bringing their own devices, so we need to adjust to accommodate this new world order.
Joshua Goldfarb's picture
An organization that keeps records of its security incidents should be able to study that data to understand the top ways in which it is generally becoming compromised.
Jason Polancich's picture
In order to make our ecosystem a safer place for all of us, small and large, the big guys out there are going to have to start - at least in part - handling the security of their small business partners, suppliers and customers.
Rebecca Lawson's picture
As enterprises made trade-offs in security; either sacrifice performance in order to add more layers of security beyond the traditional stateful firewall or don’t implement the new protections necessary to protect against many of the latest threats.