Security Experts:

More Security Headlines

Fortinet released details on the top malware, ransomware, mobile malware, IPS events, botnets, and exploit kits targeting the healthcare industry in Q4 2016. [Read More]
A locally exploitable vulnerability found in the Linux kernel can be exploited for code execution or DoS attacks [Read More]
Researchers use drones and hard drive LEDs to steal data from air-gapped computers at speeds of up to 4,000 bps [Read More]
Netflix releases Stethoscope, an open source security tool that gives users recommendations for securing their devices [Read More]
A newly discovered Android ransomware variant that packs speech recognition capabilities demands that victims speak a code provided by the attackers to unlock their devices, Symantec researchers warn. [Read More]
Yahoo slashed the price of the sale of its core Internet business to Verizon by $350 million following a pair of major data breaches at Yahoo, the two companies announced Tuesday. [Read More]
Cisco launches four new Firepower next-generation firewalls for businesses that perform a high volume of sensitive transactions [Read More]
An attacker can discover various details about Firefox users due to the manner in which the browser caches intermediate CA certificates, a researcher has discovered. [Read More]
Microsoft patched 189 critical vulnerabilities last year and a majority of them could have been mitigated by removing administrator rights [Read More]
Breach that may have affected many major organizations comes to light after nearly two years. Links found to Chinese APTs [Read More]

SecurityWeek Experts

rss icon

Adam Meyer's picture
Cyber threat intelligence needs to be tailored to its audience as it means different things to different people, whether it’s on-the-network defenders, Red Teams, threat analysts, risk officers, business executives and Board of Directors, legal, application owners, and so on.
Avi Chesla's picture
Correlating data points through more holistic analytic systems can help reveal the bigger picture and understand the real intent of an attack campaign.
Alastair Paterson's picture
It’s fairly typical for bad actors to escalate extortion-based campaigns during seasonal events when the stakes for targets are high.
Lance Cottrell's picture
Whether in a bar or in public, on the dark-web or a major news site, the lesson my Kung Fu instructor taught me on that first day can go a long way to keeping you safe.
Rafal Los's picture
When you’re solving problems it’s easy to get lost in creating something complicated. I believe that the more difficult path is to simplify, simplify, simplify.
Jack Danahy's picture
The impact of ransomware has expanded from an IT nuisance to attacks that can shut down and potentially ruin the businesses they infect.
Jennifer Blatnik's picture
Focusing on securing an endless amount of endpoints is almost impossible to do effectively. You can’t rely on the devices to be secure and you can’t rely on the consumers to secure their devices themselves.
Marc Solomon's picture
Threat intelligence has a shelf life, but there’s not a well-defined, industry standard on how to expire threat intelligence.
Ashley Arbuckle's picture
To support digital transformation, security protections must be tailored to fit the specific needs of operational technology (OT) and work in concert with IT security strategy.
Marie Hattar's picture
To fully realize the benefit of the Public Cloud, it is vital that the same due diligence applied to a physical network is applied to a cloud-based infrastructure.