Security Experts:

More Security Headlines

A new report from Akamai Technologies credit the growth of the DDoS-for-hire market for an explosion of multi-vector distributed denial of service attacks.
Several solutions from Schneider Electric are plagued by a serious vulnerability that could be exploited for remote code execution (RCE).
Researchers at SentinelOne have analyzed a new variant of the notorious banking Trojan Zeus and managed to access the control panel used by cybercriminals to monitor and control their operations.
Hackers encrypt information stored in website databases and hold it for ransom in a type of attack dubbed by researchers "RansomWeb"
It didn't take long for information security professionals to take to Twitter, blogs, and social media to blast the latest White House proposals for cybersecurity legislation. A small group of civic-minded professionals are calling on the industry to stop complaining and actually do something about it.
InfoArmor, a provider of fraud and identify theft protection services, has acquired cybercrime research firm IntelCrawler for an undisclosed sum.
Researchers at Dell SecureWorks noted a resurgence of the ZeroAccess botnet.
Experts discuss patching the recently disclosed Ghost vulnerability impacting Linux systems.
The US Federal Trade Commission called for better privacy and security to be built into the myriad of connected devices, for fitness, smart homes or other uses.
VMware has released security updates that address several vulnerabilities in vCenter Server, ESXi, Workstation, Player, and Fusion.

SecurityWeek Experts

rss icon

Marc Solomon's picture
“Slow and Low” isn’t just a popular song by the Beastie Boys. It’s also the tempo that adversaries are now choosing to launch attacks and evade detection.
Fahmida Y. Rashid's picture
Piper Jaffray's fourth annual CIO survey found that 75 percent of CIOs were expecting to increase their security spending in 2015. But are these security investments spent and utilized wisely?
Travis Greene's picture
When it comes to protecting against insider threat, there can be an over-reliance on policy and automated enforcement. Access Governance is a powerful tool to reduce the insider threat, but it needs to mature to the point where it is more responsive and more automated before relying on it completely.
Joshua Goldfarb's picture
The past few decades in the information security field have been dominated by passive failure. Clearly, not every new idea has merit, but those ideas that come about scientifically and methodically have tremendous potential to improve the state of security.
Rebecca Lawson's picture
As we enter the New Year, it’s time to reflect on these latest occurrences and consider what they may lead to in the year that lies ahead.
Nate Kube's picture
There are interesting lessons learned from IT IPS experiences that OT can benefit from. The first is to understand how attackers have bypassed traditional IPS IT solutions.
Scott Gainey's picture
Several financial analyst firms concluded extensive studies, surveying over a thousand CIOs and CSOs cumulatively, to gain a better understanding of how these breaches are impacting spending behaviors.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
Torsten George's picture
With cyber criminals increasingly targeting third-party vendors to gain backdoor access to data at large, well-protected global organizations, security professionals need to rethink their vendor risk management practices.