Security Experts:

More Security Headlines

RSA announced a new RSA SecurID Suite, moving from two-factor authentication to a full identity and access management solution. [Read More]
France said it had served formal notice on Microsoft to stop collecting what it deems excessive data and tracking browsing by users without their consent on civil liberty grounds. [Read More]
CryptXXX, the ransomware family that steals user data in addition to holding it hostage, might soon see tough competition from newcomer CrypMIC. [Read More]
Vulnerabilities in OS X and iOS allow remote code execution via specially crafted image files [Read More]
Organizations are increasingly aware about the risk of unprotected privileged accounts, but they still fail to enforce best practices [Read More]
Israeli industrial cybersecurity firm SCADAfence has teamed up with network traffic visibility platform provider Gigamon to offer a joint solution that provides visibility and protection for IT and operation technology (OT) networks. [Read More]
Cicis informed customers that cybercriminals may have stolen data from payment cards used at nearly 140 restaurants [Read More]
Oracle's Critical Patch Update (CPU) for July 2016 fixes a total of 276 vulnerabilities across multiple products, including 19 critical security flaws. [Read More]
A critical code execution vulnerability in an ASN.1 compiler exposes mobile devices and networks to remote attacks [Read More]
Recent updates to Petya ransomware no longer allow for easy data recovery, researchers warn. [Read More]

SecurityWeek Experts

rss icon

Ken McAlpine's picture
While consuming, consolidating, and correlating information provides obvious benefits, always keep in mind how you and your organization can also contribute back to these information feeds.
Joshua Goldfarb's picture
Analytics is becoming ever more important, and in my opinion, it is an important part of the future of information security.
David Holmes's picture
The portion of encrypted traffic keeps rising, so IT security administrators will be forced to do more SSL decryption if they are to get any value at all out of their fancy security tools.
Travis Greene's picture
While Identity and access management (IAM) is a mature discipline supporting internal employee access to applications, what is the future of IAM in support of end customer interactions?
Rafal Los's picture
With limited resources at your disposal, you as the security leader should work hard to make your team as efficient as possible.
Wade Williamson's picture
Collecting security data is relatively easy – the value of security analytics solutions will rest in how well they reduce that data into answers.
Adam Meyer's picture
Each area of threat intelligence has a different scope of mission, which by default would require a different set of tools and analyst background.
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
Torsten George's picture
Google Dorking can be used to identify vulnerable systems and trace them to a specific place on the Internet.
Ashley Arbuckle's picture
Regardless of what industry you’re in, your ability to successfully compete in the digital economy requires the ability to securely innovate.