Security Experts:

More Security Headlines

A hacker was allegedly able to exploit a vulnerability in Ethereum wallet client Parity and steal over $30 million worth of crypto-currency. [Read More]
US and European police on Thursday announced the shutdown of two huge "dark web" marketplaces that allowed the anonymous online trade of drugs, hacking software and guns. [Read More]
CyberX launches new technology that allows organizations to simulate breach and attack vectors on their ICS networks [Read More]
Avast acquires Piriform, the creator of the popular cleaning and optimization tool CCleaner, for an undisclosed amount [Read More]
FedEx says TNT is still working on restoring critical systems affected by the NotPetya malware, but some data may never be recovered [Read More]
Cybersecurity firms Endgame And Corvil have integrated their products to give greater visibility and protection across the entire infrastructure. [Read More]
Tor launches public bug bounty program with rewards of up to $4,000 per vulnerability, depending on impact and severity [Read More]
Apple this week released security patches for all four of its operating systems to resolve tens of security bugs in each of them. [Read More]
Vulnerabilities found by researchers in the Segway miniPRO allow hackers to take control of the hoverboard and possibly cause injury to the rider [Read More]
CrowdStrike and Dragos form strategic partnership to provide comprehensive ICS / SCADA security services. [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
For many organizations, threat intelligence is at an inflection point; it can either add to the complexity security teams struggle with on a daily basis, or it can provide clarity and enable a more secure future.
Steven Grossman's picture
Planning for cyber protection and resiliency is a large topic that requires the right framework and a balance of strategic and tactical thinking.
Joshua Goldfarb's picture
Will your security team always see the security program like elementary school children see the water fountain -- just right or on the path to being just right?
Michael Adler's picture
With summer fully upon us, we in the security profession need to make sure the change in season doesn’t create additional vulnerabilities.
Justin Fier's picture
Every company and organizations is vulnerable to cyber-attacks, and investing in security innovations and gaining total network visibility are more important than ever.
Erin O’Malley's picture
Finding patterns and uncovering clues within network noise requires both broad and granular visibility into traffic (plain-text and encrypted) and is essential for defense against advanced threats.
Oliver Rochford's picture
The lifting of certain sanctions may provide an alternative incentive to limit certain types of cyberwar activity.
Josh Lefkowitz's picture
While President Trump’s executive order has laid an impressive and hopeful foundation for a more secure nation, its focus on bolstering federal defenses against large-scale cyber attacks and nation-state cyber threats is still too narrow.
Adam Meyer's picture
Tactical cyber threat intelligence can provide you with specifics around the technical aspects of an attack and help you identify areas within your environment to shore up.
Alastair Paterson's picture
There’s a great deal of intelligence organizations can find on the deep and dark web, but it's important to remember that criminal activity isn’t limited to the dark web.