Security Experts:

More Security Headlines

A new piece of malware discovered by researchers at Trend Micro is designed to steal files from infected systems and upload them to the file storage and synchronization service Google Drive.
Microsoft has become aware of targeted cyberattacks leveraging a new vulnerability (CVE-2014-6352) that affects most supported Windows releases.
Apple CEO Tim Cook met a senior Chinese official Wednesday, days after hackers targeted the company's iCloud service in an attack which an anti-censorship group claims originated in China.
Google launched "Security Key", a physical USB second factor that's designed to provide an extra layer of protection to user accounts.
Iranian security services have arrested several "spies" in Bushehr province, where the country's sole nuclear plant is based, Intelligence Minister Mahmoud Alavi announced Sept.21.
Apple said Tuesday its iCloud server has been the target of "intermittent" attacks, hours after a security blog said Chinese authorities had been trying to hack into the system.
Poor configurations can lead to credential exposure, according to Palo Alto Networks.
Staples said Tuesday it is investigating the possible theft of customer credit card files, a day after a security website reported the likely data breach.
Apple has released a new version of its mobile operating system and, in addition to some interesting new features, the latest version includes fixes for several security issues.
Zscaler announced the availability of a new version of the its cloud-based Internet security platform, which now provides protection against advanced persistent threats (APT).

SecurityWeek Experts

rss icon

Mark Hatton's picture
Software and hardware alone are not enough to manage a massive enterprise security program. You need security professionals and experienced leaders who can keep the team (and the tools) operating effectively.
Jason Polancich's picture
Las Vegas has created a market-proven, repeatable formula for business success. For enterprises competing each and every day with cybercriminals, what if we were to apply these same principles to enterprise cybersecurity?
Eddie Garcia's picture
Many features are available for Apache Hadoop that can help enterprises pass internal and external security requirements and audits.
Travis Greene's picture
Though there are unique risks associated with identity and access from mobile devices, there are also opportunities that mobile devices bring to address identity concerns.
Joshua Goldfarb's picture
Proper visibility doesn’t have to mean a deluge of uncoordinated data sources. To security operations and incident response teams, the buzz and hype should be about “big value”, not “big data”.
Fahmida Y. Rashid's picture
Opinions vary wildly among experts as to the potential impact of the Shellshock vulnerability. What is known—and agreed upon—at this point, is that Shellshock is a very serious vulnerability because it allows remote code execution and gives the attacker full access to the system.
Adam Firestone's picture
The misconception that Internet privacy equals anonymity must be dispelled if cyberspace is to be a secure and safe place. At the same time, mechanisms must be incorporated to ensure that communications remain confidential and resistant to unauthorized alteration by third parties.
James McFarlin's picture
Does a dangerous threat lie with ISIS’s possible use of cyber weapons against American critical infrastructure, financial system or other targets? Will such attacks be attempted and do the capabilities exist within ISIS to do so?
Wade Williamson's picture
As we build more accessible, scalable, and efficient computing models, we likewise open ourselves up to attacks that are likewise more accessible, scalable and efficient.
Marcus Ranum's picture
A few years ago, there was a bit of discussion about improving security. A number of researchers' systems and faculty systems had been compromised, and “something must be done” - but what?