Security Experts:

More Security Headlines

A Macedonian citizen suspected of being the operator of a carding website has been extradited to the United States [Read More]
Cybercriminals using Ransomware in attacks appear to be leveraging infected machines for additional nefarious purposes, such as launching distributed denial of service (DDoS) attacks, researchers at Invincea warn. [Read More]
A researcher received $5,000 from Facebook after finding a couple of vulnerabilities that could have been exploited to brute-force Instagram accounts [Read More]
Information disclosure vulnerabilities found in Siemens’ SIPROTEC protection relays. Firmware updates released for some affected products [Read More]
A large number of wireless networking devices from Ubiquiti have been infected by a worm that spreads via an old vulnerability [Read More]
The "Suckfly group" has launched attacks against government and commercial organizations in numerous countries, but the primary targets appear to be individuals and organizations located in India. [Read More]
Vulnerabilities found by researchers in one of LG’s NAS products allow hackers to remotely gain admin access to devices [Read More]
TeslaCrypt, one of the largest ransomware threats over the past months, appears to have shut down, with its authors already releasing a master decryption key, researchers at ESET report. [Read More]
Moxa releases firmware update to patch several high severity vulnerabilities found in one of its industrial secure routers [Read More]
Cisco has updated AsyncOS for Web Security Appliance to patch several high severity DoS vulnerabilities [Read More]

SecurityWeek Experts

rss icon

Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Ken McAlpine's picture
The emergence of IoT may finally be the technology that brings security from a network afterthought and bolt-on technology to an integral, persistent, omnipresent part of the network.
Joshua Goldfarb's picture
Before we can understand the purpose of analysis within the greater incident response process, we need to better understand the decision-making process.
Bill Sweeney's picture
The concept of cyber Unicorns is that financial crime achieved via cyber means is no longer a pastime; rather it’s a full time job.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Avi Chesla's picture
Security technologies must be provisioned with the right policy in order to ensure it complements the neighboring solution, and must also be activated in the right sequence.
Jim Ivers's picture
Developers are not trained in security and security is not yet an adequately integrated component of the development process. We are not applying good, or even minimal, security practices.
Scott Simkin's picture
Threat intelligence is only valuable if an organization takes the necessary steps to quickly and easily apply that intelligence to actual security policy.
Shlomo Kramer's picture
When it comes to deciding why you should re-evaluate security vendors, the solution’s roadmap is of strategic importance because it may require technical analysis and rethinking of the overall network security architecture.
Emily Ratliff's picture
Writing yet another “security” paper isn’t going to do the trick. Security practitioners need to do a better job of getting our messages integrated into core developer documentation.