Security Experts:

More Security Headlines

A media rights group urged Qatar to revoke sections of a new cybercrime law, saying they threaten freedom of expression in the Gulf state.
The malware steals Apple ID and password information and makes purchases from Apple's official App Store.
According to Bromium, attackers planted malicious code on a United States-based company's website in an effort to infect the computers of its visitors, an attack known as a watering hole attack.
Chinese hackers believed to be linked to Beijing conducted dozens of cyberattacks on US defense contractors between 2012 and 2013, potentially compromising military operations, a congressional probe warned.
Hackers accessed the hosted managed services environment of Goodwill vendor C&K Systems for roughly 18 months
Amazon has addressed a security hole that enabled attackers to inject malicious code into the company's website and potentially compromise user accounts, according to a researcher.
Cyber risk intelligence company SurfWatch Labs has released a new application designed to provide C-level executives and board members with clear information on cyber risks faced by their company.
Nigeria's anti-graft agency said it was hunting a 38-year-old bank worker for allegedly stealing $38 million from his employers by hacking into computer systems.
Security researcher Ahmed Aboul-Ela discovered multiple Insecure Direct Object Reference flaws that could have been leveraged by an attacker to delete the cards associated with Twitter Ads.
In a follow-up to a report earlier this year on the use of visual basic code in malicious documents, researchers at Sophos say the trend is continuing to gain momentum.

SecurityWeek Experts

rss icon

Jason Polancich's picture
Collecting just a small amount of info regularly and diligently for your supply chain can not only help you secure your back doors, but the front entrances too.
Adam Ely's picture
COPE is often an attractive model for organizations concerned about keeping mobile data secure but presents its own set of issues. So how does COPE stack up against BYOD?
Scott Simkin's picture
Enterprises must tailor their security policy and protections to the actual threats they experience and to the threat landscape at large.
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
Adam Firestone's picture
The time has come for the technology professions to demonstrate ethical maturity and adopt standards of ethical conduct to which we hold ourselves and our peers accountable.
Marc Solomon's picture
With the right information, security professionals can quickly pivot from detection to a full understanding of the scope of the outbreak and take action to head off wider compromises
Torsten George's picture
A risk-driven approach addresses both security posture and business impact to increase operational efficiency, improve assessment accuracy, reduce attack surfaces, and improve investment decision-making.
Joshua Goldfarb's picture
Getting to the root cause involves a level of understanding beyond that of simply identifying that a system in infected. We need to understand what specifically enabled or facilitated the infection.
Travis Greene's picture
The significant breaches of today are executed by people infiltrating the organization, and attackers are doing this by assuming identities or abusing insider privileges.
Danelle Au's picture
Cloud service providers play a key role in delivering security, but as part of the shared responsibility model, they are not liable for access to and usage of the cloud application.