Security Experts:

More Security Headlines

A hacker was allegedly able to exploit a vulnerability in Ethereum wallet client Parity and steal over $30 million worth of crypto-currency. [Read More]
US and European police on Thursday announced the shutdown of two huge "dark web" marketplaces that allowed the anonymous online trade of drugs, hacking software and guns. [Read More]
CyberX launches new technology that allows organizations to simulate breach and attack vectors on their ICS networks [Read More]
Avast acquires Piriform, the creator of the popular cleaning and optimization tool CCleaner, for an undisclosed amount [Read More]
FedEx says TNT is still working on restoring critical systems affected by the NotPetya malware, but some data may never be recovered [Read More]
Cybersecurity firms Endgame And Corvil have integrated their products to give greater visibility and protection across the entire infrastructure. [Read More]
Tor launches public bug bounty program with rewards of up to $4,000 per vulnerability, depending on impact and severity [Read More]
Apple this week released security patches for all four of its operating systems to resolve tens of security bugs in each of them. [Read More]
Vulnerabilities found by researchers in the Segway miniPRO allow hackers to take control of the hoverboard and possibly cause injury to the rider [Read More]
CrowdStrike and Dragos form strategic partnership to provide comprehensive ICS / SCADA security services. [Read More]

SecurityWeek Experts

rss icon

Oliver Rochford's picture
Security automation is highly desirable. But this desire has been inhibited by doubt about the accuracy of the detection of threats, and fear of the consequences of automating the containment or mitigation responses.
Travis Greene's picture
While it’s easy to rely on metrics that are readily available, how does one determine which metrics are actually a measure of security success as it pertains to the overall business priorities?
Preston Hogue's picture
The problem with the CISO role today is that it holds a C-level title but may not always be at the C-level. So how does our CISO profession continue to evolve and gain that seat?
Marc Solomon's picture
Scaling your operations allows you to get more from these investments and demonstrate even greater value to the organization – and you already have what you need to get going.
Ashley Arbuckle's picture
Many organizations are not achieving the full benefits of digital transformation because they lack a comprehensive security program.
Jennifer Blatnik's picture
Whether they come from a technical, business or even military background, all CISOs experience a number of personal and professional roadblocks on a daily basis that challenge the ultimate success of their company’s security.
Jim Ivers's picture
These recommendations will help your organization reduce risk and save real money on the cost of resolving defects. It is not often you get such a clear win-win scenario.
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Marc Solomon's picture
For many organizations, threat intelligence is at an inflection point; it can either add to the complexity security teams struggle with on a daily basis, or it can provide clarity and enable a more secure future.
Steven Grossman's picture
Planning for cyber protection and resiliency is a large topic that requires the right framework and a balance of strategic and tactical thinking.