Security Experts:

More Security Headlines

Users file class actions against Yahoo in California and Illinois over the recently disclosed data breach that affected 500 million accounts [Read More]
Please join Centrify and SecurityWeek for a live webinar where will discuss guidance from the National Institute of Standards and Technology (NIST) along with best practices and regulation mandates. [Read More]
A patch released last week by the OpenSSL Project for a low severity issue led to a critical vulnerability that could allow code execution [Read More]
A member of the hacker group that breached Yahoo in 2012 has been sentenced to 2 years in prison in the UK [Read More]
Microsoft removes the Windows Journal component from its operating systems following the discovery of many vulnerabilities [Read More]
Spam email volumes have increased significantly this year, being comparable to the record levels observed in 2010, mainly because of the increased activity of the Necurs botnet, Cisco Talos researchers believe. [Read More]
Yahoo's claim that it is the victim of a gigantic state-sponsored hack raises the question of whether it is the latest target for hackers with the backing of Russia, China or even North Korea, experts say. [Read More]
Hacker Ardit Ferizi, who helped the Islamic State group by providing stolen personal data on more than 1,000 US government and military workers was sentenced to 20 years in prison. [Read More]
File types used by attackers to deliver ransomware include JavaScript, VBScript, and Office files with macros, all coded in ways meant to evade detection from traditional security solutions. [Read More]
Kaspersky details biometric skimmers and other methods that can be used by cybercrooks in ATM attacks [Read More]

SecurityWeek Experts

rss icon

Alastair Paterson's picture
Sophisticated adversaries are finding vulnerabilities wherever they can, and often that means looking to an organization’s partners for weaknesses in defenses.
Travis Greene's picture
As the demand for identity governance in Asian companies grows, the key differentiator is that it’s going to come from a need to reduce risk.
Erin O’Malley's picture
Conventional email security solutions may defend against spam, viruses, and malware, but they don’t defend against ignorance or egregious stupidity.
Torsten George's picture
By implementing these three main pillars, organizations can operationalize their cyber security practices to shorten time-to-detection and ultimately, time-to-remediation of cyber threats.
Scott Simkin's picture
Cybersecurity needs to build bridges between the security operations (SecOps), network operations (NetOps) and physical security teams to be successful.
Ashley Arbuckle's picture
Managed Detection and Response (MDR) services differ from traditional managed security services in three ways: speed, accuracy, and focus. Here’s how.
Rafal Los's picture
if you’re starting to get pulled into an initiative, or it’s time to revisit a part of your security program on which you can’t quite quantify the returns, start with outcomes.
Jim Ivers's picture
Organizations should understand the risks and returns of open source and either start putting policies in place or getting serious about enforcing existing policies.
Joshua Goldfarb's picture
One unfortunate side effect of continual change can be what I colloquially call “shiny object syndrome” (SOS).
Barak Perelman's picture
To protect against external threats, malicious insiders and human error, industrial organizations must monitor all activities - whether executed by an unknown source or a trusted insider.