Security Experts:

More Security Headlines

Rudi Giuliani could prove a good selection as a cyber security advisor to Donald Trump if his role is primarily as an informal executive meeting facilitator. [Read More]
An estimated 35,000 Elasticsearch clusters exposed to the public Internet are potential victims to a series ransom attacks that have already hit over 33,000 MongoDB databases. [Read More]
Aerospike Database Server affected by critical and high severity remote code execution and information disclosure vulnerabilities [Read More]
Hacker claims to have stolen 900 Gb of data from Israeli mobile forensics company Cellebrite [Read More]
Microsoft has launched a web-based dashboard for users interested in reviewing the data collected by the company, and also announced changes to Windows 10’s privacy features. [Read More]
The mysterious hacking group calling themselves “The Shadow Brokers” has apparently decided to put an end to their failed attempts to sell exploits and hacking tools they claimed to have stolen from the NSA-linked Equation Group. [Read More]
The EyePyramid malware used to spy on important people in Italy is not very sophisticated, but it still allowed attackers to steal a lot of sensitive data for a long time [Read More]
A new variant of the Ploutus ATM (automated teller machine) malware was recently observed that could be adapted to target a wide variety of ATMs. [Read More]
Google has launched a beta version of a new Cloud Key Management System (KMS) to supplement the existing Google-managed server-side encryption and customer-controlled on-premise key management. [Read More]
GoDaddy has revoked nearly 9,000 certificates after discovering a bug that caused the domain validation process to fail [Read More]

SecurityWeek Experts

rss icon

Ken McAlpine's picture
Dozens of isolated security tools and platforms, regardless of how relevant they are to new cloud-based networks, create their own problem.
Alastair Paterson's picture
As the year comes to a close, let’s take a look at five examples that demonstrate this ongoing tug of war between adversaries and defenders.
David Holmes's picture
You’ll see a lot of security predictions coming around this time of year, and you can make your resolutions based on those. Or you can look back at your own year and customize your own security resolutions.
Scott Simkin's picture
If any of these New Year’s resolutions are not on your “to do” list for 2017, I would challenge you to add them.
Josh Lefkowitz's picture
It's crucial for healthcare institutions to recognize their industry’s inherent susceptibility to cyber threats and that standards and regulations will, by their nature, always be reactive.
Marc Solomon's picture
For cybersecurity professionals who know that the industry has no shortage of threat data, context is the lever that turns threat data into threat intelligence.
Ashley Arbuckle's picture
As 2016 comes to a close, the time is right to look back at the year to reflect on those security lessons we learned and to identify emerging trends.
Steven Grossman's picture
The goal of stopping all cyber attacks and preventing all business impact has been recognized as a fool’s errand, and has shifted to measuring risk and minimizing business impacts.
Torsten George's picture
Since most IoT devices and microservices lack adequate security frameworks or tools to monitor and detect security gaps, traditional methods such as penetration testing should be reconsidered despite their hefty price tag.
Dan Cornell's picture
When security teams can assess brand, financial, strategic risks – they are best able to act as a trusted advisor to DevOps teams as they build and maintain secure systems.