Security Experts:

More Security Headlines

Palo Alto Networks has acquired Silicon Valley-based CirroSecure, a security startup focused on protecting Software as a Service (SaaS) applications.
A new report shows that the cost of dealing with a data breach rose to $154 per compromised record.
A vulnerability (CVE-2015-4050) in the PHP web application framework Symfony exposes apps to unauthorized access.
Fortinet has agreed to acquire Meru Networks (NASDAQ: MERU), a provider of enterprise wireless networking solutions, for roughly $44 million in cash.
Flash Player vulnerability (CVE-2015-3090) fixed two weeks ago integrated into Angler exploit kit. The flaw is leveraged to deliver the Bedep Trojan.
New global initiative backed by security researchers, firms and organizations aims at making smart cities cyber-safe.
Check Point announced the availability of 1200R, a new rugged security gateway appliance designed to protect ICS/SCADA systems.
Hackers stole information on 100,000 taxpayers from the online computers of the US Internal Revenue Service, the federal tax agency said.
The worm is being used to commit fraud on social networks such as Facebook and Twitter, researchers believe.
IDA users provided new license keys and asked to change passwords after Hex-Rays detects data breach. The company says it was a targeted attack.

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
Life is full of distractions, and the information security profession is not immune to them. Security professionals have an obligation to remain focused on building, maturing, and improving our security programs and security postures.
Torsten George's picture
How can companies deal with this challenge and transition to a model that uses more data to assess risks? One way is to implement cyber security operational risk management best practices.
Rafal Los's picture
Security leaders struggle to replicate successes from one enterprise to another largely because they are starting from scratch at every new turn.
Jason Polancich's picture
Cyber defense must develop from a solid foundation in verifiable data into repeatable, measurable processes that mitigate or eliminate risk. With simple risk intelligence, any business can go from nothing to something much faster.
Marc Solomon's picture
By embedding security everywhere across the extended network, not only does security become more effective against advanced attacks, it also becomes a business enabler.
Travis Greene's picture
Security teams must bear equal, if not more responsibility, for reducing the risk of credential fatigue leading to inadvertent exposure.
Mark Hatton's picture
In the world of security, there is often a significant difference between perceived reality and what is actually happening, and the public’s perception of security within your organization can be just as important as reality.
Adam Ely's picture
The mobile strategist will play a pivotal role in mobile integration, as they pave the way for the organizations to do so purposefully and securely.
David Holmes's picture
After the rounds of predictions for 2014, I had bet my colleague that if no mobile DDoS appeared this year, we’d stop talking about it. And it looks like we can.
Rafal Los's picture
Prioritizing is an unenviable job many security professionals must do every day – do you go live with a product on time, or do you hold it to fix that security bug which could cause a catastrophic failure?