Security Experts:

More Security Headlines

Synaptics to remove debug tool from its touchpad drivers after it was described by a security researcher as a keylogger [Read More]
Netherlands-based security firm Fox-IT revealed that it was the victim of an MitM attack after hackers changed DNS records at its domain registrar [Read More]
Google has shared detailed information on how it protects service-to-service communications within its infrastructure at the application layer and the the system it uses for data protection. [Read More]
Britain's cyber-spooks are reaching out from behind their veil of secrecy with the aim of cultivating the nation's next generation of high-tech sentries -- a move not without security risks. [Read More]
A new piece of malware designed to target ICS, named "Triton", has been used in an attack on a critical infrastructure organization and the goal may have been to cause physical damage [Read More]
An unpatched critical vulnerability impacting DirecTV’s wireless video bridge allows for an attacker to remotely execute code on the vulnerable devices, Zero-Day Initiative researchers reveal. [Read More]
In an effort to boost the fight against malicious software, anti-malware company Avast this week announced the release of its retargetable machine-code decompiler as open source. [Read More]
Cisco announces availability of Security Connector, an iOS app that gives organizations visibility and control for mobile devices [Read More]
Severe vulnerability found by researchers in Fortinet’s FortiClient endpoint protection product can be exploited to obtain VPN authentication credentials [Read More]
Internet traffic for major tech firms such as Google, Apple, Facebook and Microsoft was briefly rerouted to Russia in a BGP attack [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
There’s no reason that 2018 should be another year where attackers continue to successfully exploit the known.
Alan Cohen's picture
While the overwhelming array of choices has given technologists a lot to evaluate, they have not gone far enough to lower the actual security risk facing organizations.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.
Joshua Goldfarb's picture
Many organizations seem to focus almost entirely on technological solutions to tactical problems, rather than on strategically addressing how they can best and most efficiently protect data.
David Holmes's picture
The "Reaper" IoT botnet is holding itself up as a blinky light in front of our faces, reminding the InfoSec community that we really need to get ahead of IoT madness.
Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Marie Hattar's picture
Without visibility, your security teams are more likely to over or under invest in your company’s security infrastructure. That is a big risk to take.
John Maddison's picture
Cybercriminals have begun to leverage automation and machine learning in their attack tactics, techniques, and procedures (TTP).
Markus Jakobsson's picture
While there are no signs today of criminals consolidating and reselling data from different breaches, it is an obvious concern as the value-add of the packaging would be substantial.
Justin Fier's picture
Organizations still using the legacy approaches from a year ago to five years ago are consistently outpaced and forced to play catch-up.