Security Experts:

More Security Headlines

Huawei CEO Ren Zhengfei said at the World Economic Forum that China has never asked it to spy on the United States or others.
Google announced on Wednesday the release of Chrome 40 for Windows, Mac OS and Linux. The latest update for the popular Web browser (40.0.2214.91) includes a total of 62 security fixes.
While analyzing an instance of the Angler exploit kit, French security researcher Kafeine identified what appears to be an exploit for an Adobe Flash Player zero-day vulnerability.
According to Vormetric's 2015 Insider Threat Report, 93 percent of the organizations surveyed based in the U.S. felt they were vulnerable to insider threats.
Researchers at ShmooCon examined how users can be tracked via their mobile apps.
A serious cross-site scripting (XSS) vulnerability plaguing the Google Apps administrator console was patched by the search giant a few months ago.
Israeli police arrested a man suspected of hacking into the computers and stealing the work of international recording artists including Madonna, police said.
Application networking solutions provider A10 Networks unveiled on Tuesday a new version of the Advanced Core Operating System (ACOS) platform, which powers many of the company’s products.
Please join us for a special webcast: Protecting Against Fraud and Cybercrime from Mobile Devices, presented by ThreatMetrix.
Technological advances are to explode 10 times faster than even the Internet boom in the 1990s, top tech tycoons told the global Davos elite Wednesday, but also warned that security threats would be worse this year than ever.

SecurityWeek Experts

rss icon

Marc Solomon's picture
The threat landscape is ever evolving and always advancing with tailor-made, stealthy threats that evade traditional, point-in-time security defenses.
Travis Greene's picture
The combination of access governance and self-service access request and approval provides the best approach to strike back at the access clones.
David Holmes's picture
The media was so taken with the idea that Kate Upton nude photos had caused a DDoS attack that they just took the story and ran with it. But what really caused disrupted service across New Zealand’s major ISPs?
Avi Chesla's picture
In order to be effective, security solutions must become more directly associated, in real-time, to cyber defense planning models.
James McFarlin's picture
U.S tech giants are playing a game of high-stakes global brinksmanship around who has rights to control their data, which impacts their European growth prospects, business models, and ultimately stock valuations.
Joshua Goldfarb's picture
Asking the right questions is one of the most important and fundamental aspects of a successful security program, and allows security teams to approach challenges analytically and logically.
Adam Ely's picture
We can attempt to predict the future, but without proper security measures in place, data breaches are bound to happen. Unfortunately, it’s not a matter of if a breach will occur, but when.
Danelle Au's picture
When it comes to SaaS applications versus on-premise, there are three characteristics that define the need for a different approach to data governance, risk management and security in the cloud.
Mark Hatton's picture
Without the ability to prioritize in certain situations, you may end up waiting weeks to apply the most important patch. Think of your corporate network like your home. There are probably lots of items on your honey do list, but they can’t all be completed today.
Torsten George's picture
2015 will prove to be a challenging year for IT security professionals. So, what can we expect in the next 12 months?