Security Experts:

More Security Headlines

Sony Pictures has reached an undisclosed agreement in principle with eight former employees who had sued over inadequate protection of their personal data during last year's major hack against the studio.
Systems and security management company Tanium has raised an additional $120 million in funding from a handful of investors, bringing the total raised by the software maker to $262 million.
Microsoft has pushed its Diagnostics and Telemetry tracking service to existing in-use Windows 7 and Windows 8 devices in an effort to collect more data on them.
Researchers discover new version of the notorious Carbanak banking Trojan. The new variant has been used to target large corporations in the U.S. and Europe.
Tripwire launched Tripwire Asset Discovery Appliances, a high-performance, device and application discovery solution that is easy-to-deploy on all types of networks.
Netflix this week released an in-house developed tool for discovering cross-site scripting (XSS) vulnerabilities in applications and for scanning secondary software programs for potential XSS flaws.
Two remotely-exploitable critical DoS vulnerabilities have been patched in BIND. Servers should be updated ASAP.
Researchers have uncovered an adware installer that uses an old trick to access the OS X keychain.
Several serious vulnerabilities found in Seagate wireless hard drives. Firmware updates available.
The Iran-linked cyber espionage group dubbed “Rocket Kitten” has launched attacks against individuals and organizations in the Middle East. Expert identified hundreds of targets.

SecurityWeek Experts

rss icon

Jason Polancich's picture
it seems most just don’t see that cyber intelligence needs to become a prioritized, resourced part of what they’re already doing.
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Torsten George's picture
Organizations that address certain inhibitors to risk management head-on, can significantly reduce the time it takes to produce risk profiles.
Mark Hatton's picture
The country has become obsessed with a couple of pounds per square inch (PSI) in a football, yet seems to have no issue ignoring simple steps that could greatly improve our overall cyber security.
Wade Williamson's picture
In security circles, 2014 was known colloquially as “the year of the breach.” However, 2015 almost doubled the 2014 tally of breached records, and has done so in the first eight months.
Marc Solomon's picture
How do we handle the responsibility that cloud computing brings? It’s a responsibility that must be shared among vendors, users, business leaders, and IT security professionals and involves three key aspects.
Joshua Goldfarb's picture
The way in which we as a security community seem to be approaching the topic of information sharing seems backward to me.
Alan Cohen's picture
If vaults deep within the building protect banks from bank robbers, why do so many security professionals focus so much attention on their data center’s front door?
Rafal Los's picture
Security people who jump into troubled security organizations to help right the ship put their careers on the line and personal aspirations on hold, and their families take a temporary back seat.
Nate Kube's picture
Critical services we rely on are increasingly dependent upon cyberphysical interactivity. The scope of these critical services continues to broaden and deepen across industries, especially as the functionality and speed of devices is more widely understood.