Security Experts:

More Security Headlines

A new version of the NTP daemon patches several low and medium severity vulnerabilities [Read More]
High-Tech Bridge has launched a new free service to help web site owners and businesses understand and locate domain name threats that could be targeted at them and their customers. [Read More]
The cyber capabilities of the Islamic State and its supporters are still relatively weak and appear to be underfunded and poorly organized, according to a report from Flashpoint. [Read More]
Software developed by a French advertising company creates backdoors on 12 million computers [Read More]
Mozilla patches 14 vulnerabilities, including critical and high severity issues, with the release of Firefox 46 [Read More]
The FBI said it would not disclose details of its hack of an iPhone used by one of the shooters in last year's San Bernardino killing spree. [Read More]
Verizon has published its widely anticipated 2016 Data Breach Investigations Report (DBIR), compiled by Verizon with the support 67 contributing partners. [Read More]
Multiple forms of malware have been found in a German nuclear energy plant in Gundremmingen, 75 miles north-west of Munich. [Read More]
Kaspersky says malicious actors are increasingly abusing open source security tools such as the Browser Exploitation Framework (BeEF) [Read More]
The accounts of more than 7 million members of the Minecraft community “Lifeboat” have been exposed after a data breach in early 2016. [Read More]

SecurityWeek Experts

rss icon

Johnnie Konstantas's picture
To extend the capabilities of advanced cybersecurity tools at the centralized production environment, implementing an out-of-band transport network to get visibility into both packet data and syslog traffic can be very beneficial.
Rafal Los's picture
Attackers are exploiting issues in corporate identity stores with greater frequency. If you doubt the danger that identities pose to your organization, you should conduct a simple test.
Bill Sweeney's picture
Enterprises have to worry about the surface area that is open for attack and the challenge of detecting attacks quickly when they are occurring. In every instance simplification will help.
Scott Harrell's picture
Granular network segmentation is a security best practice that dramatically curtails the ability of attackers to move about the network, limiting the spread of destructive malware and ransomware and helping to keep critical assets safe.
Torsten George's picture
CISOs should pro-actively monitor their company’s risk posture and provide quantitative views of the organization’s risk posture on a semi-annual basis — at the very least.
David Holmes's picture
How do you secure application components when they’re shifting from cloud to cloud? Any traffic traversing from one public cloud to another is by definition crossing the Internet and should therefore not be trusted.
Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Jack Danahy's picture
If you keep your focus on how you can remain attractive to those that worry more about keeping the doors open than keeping the network ports closed, you will be more than just one of the million.
Wade Williamson's picture
The ability to quickly and reliably detect lateral movement in the network is one of the most important emerging skills in information security today.
Simon Crosby's picture
Next-gen Anti-Virus can’t help any more than traditional AV, but the principle of least privilege, enforced through virtualization based security, can stop the breach before it starts.