Security Experts:

More Security Headlines

WordPress 4.8.2 patches 9 vulnerabilities, including XSS, SQL injection, path traversal and open redirect issues [Read More]
Joomla patches two vulnerabilities, including a login page flaw that allows attackers to guess admin credentials character by character [Read More]
Equifax advised victims of the recent breach on Twitter to access a fake support website instead of equifaxsecurity2017.com [Read More]
The United States Securities and Exchange Commission (SEC) said a cyber-attack in 2016 may have allowed hackers to profit through trading on non-public information in its EDGAR filing system. [Read More]
FedEx estimates that the recent NotPetya malware attack had an impact of $300 million on the company’s earnings in the latest quarter [Read More]
Iranian hackers target aerospace and energy organizations in the US, Saudi Arabia and South Korea [Read More]
Unprotected AWS cloud storage bucket leaks internal access credentials and other critical data from Viacom [Read More]
Researchers demo aIR-Jumper, a malware that uses infrared (IR) cameras to open a two-way communication channel to air-gapped networks [Read More]
Threat Stack, a Boston based intrusion detection startup, has raised $45 million in a Series C funding, bringing the total raised by the company to more than $70 million. [Read More]
Apple this week announced the availability of 8 security patches for its iPhone 5s and later, iPad Air and later, and iPod touch 6th generation users, released as part of the iOS 11 platform upgrade. [Read More]

SecurityWeek Experts

rss icon

Rafal Los's picture
Rather than starting with a sound, business-aligned strategy supported by business-executive stakeholders there are far too many security organizations that just choose the “do something” path.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Adam Meyer's picture
Want to hire the best analyst? Then first define what is usable and then focus your search on those characteristics.
Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.
Preston Hogue's picture
Even the most knowledgeable users — the very CISOs and security professionals who may be reading this article — can be duped into taking the bait.
Travis Greene's picture
Operating with the assumption that you’ve already been hacked makes security incident response planning a priority for the organization.
Steven Grossman's picture
Why do we seem to need layer upon layer of regulation and guidance to try to ensure a more secure business world? Is it working?
Marc Solomon's picture
To more effectively prioritize to ensure relevance of threat intelligence, humans must be involved. After all, who understands your environment better than you?
Ashley Arbuckle's picture
Segmentation is an important element of any security strategy to mitigate risk from IoT-based attacks, but it has to be done right.
Jennifer Blatnik's picture
Almost every industry can improve efficiencies with blockchain. But what will make blockchain a success is ultimately security.