Security Experts:

More Security Headlines

Russian national accused of hacking LinkedIn and Dropbox apparently made over 1,500 bitcoins in 2013, including 620 stolen from the exchange [Read More]
Apple this week released a new set of security patches to resolve multiple vulnerabilities in iOS, macOS Sierra, Safari, tvOS, and watchOS. [Read More]
Mozilla has decided to distrust new certificates from WoSign and StartCom. The browser vendor says the CAs have been deceptive [Read More]
Kaspersky Lab launches Industrial Control Systems Computer Emergency Response Team (ICS-CERT) [Read More]
Italian security researchers have discovered a vulnerability that can be easily exploited to break into messaging applications such as Telegram, WhatsApp, and Signal. [Read More]
Muddy Waters and MedSec have responded to St. Jude’s lawsuit. Their claims have been backed by an outside security consulting firm [Read More]
A high severity DoS vulnerability that was fixed in ISC BIND releases in May 2013 affects some Linux distributions [Read More]
The Russian national arrested by Czech police has been charged in the U.S. for allegedly hacking LinkedIn, Dropbox and Formspring [Read More]
The DDoS attacks on Dyn’s DNS service, which caused disruptions to several major websites, was powered by Mirai botnets [Read More]
Russia's foreign ministry on Sunday said an old version of its website had been attacked after a US hacker claimed he broke in and posted a mocking message. [Read More]

SecurityWeek Experts

rss icon

Adam Meyer's picture
One key aspect of making threat intelligence practical is to ensure the intel is evaluated. What do I mean by this?
Rocky DeStefano's picture
Hadoop — with its ability to ingest, process and provide analytics for nearly untold amounts of data — is being adopted to solve many of the cybersecurity challenges we face.
Alastair Paterson's picture
Employees who have reused corporate emails and passwords for personal use can put their employers at risk of account takeovers, credential stuffing and extortion attempts.
Erin O’Malley's picture
A security delivery platform delivers visibility into lateral movement of attackers, accelerates detection of data theft activity, and can reduce the overhead, complexity, and costs associated with security deployments.
Joshua Goldfarb's picture
The modern security practitioner needs to be a pragmatist that works with the business to improve security without negatively impacting the business.
Torsten George's picture
Implementing a Zero Trust model represents a dramatic change and requires a well-planned transition that should be complimented by efforts to operationalize cyber risk detection, prevention, and response.
Marie Hattar's picture
By following these best practice techniques, you can ensure that your security architecture maximizes your company’s overall security posture and its efficiency.
Scott Simkin's picture
While exploit kits are certainly contributing to the steady rise in the number of cyberattacks, in the end, the methods they use to infect endpoints and networks can be stopped provided the proper steps are taken.
Ashley Arbuckle's picture
But by asking these key questions you can understand what’s required to proactively detect and respond to today’s malicious and complex attacks.
David Holmes's picture
SWEET32 is probably not something that an enterprise administrator needs to lose sleep over. Very likely, we will never see a SWEET32 attack in the wild, just as we never have for POODLE or BEAST.