Security Experts:

More Security Headlines

Many high-profile companies are using an old PHP file manager that is full of security holes, research warns.
Anonymous hackers steal thousands of records from US Census Bureau. Agency says only non-confidential system have been breached.
Security experts comment on Charlie Miller and Chris Valasek’s car hacking research.
Fiat Chrysler recalls 1.4 million cars for a software update after researchers demonstrated that connected vehicles can be remotely hacked.
Gigamon launched its GigaSECURE platform that was designed to give enterprises extensive visibility into network traffic, users, applications and suspicious activity.
Google study shows regular users don’t see software updates as an important online security practice.
Red Hat patches two vulnerabilities related to “libuser” library. The flaws can be used for DoS attacks, and privilege escalation if combined.
WordPress 4.2.3 has been released. The latest version patches 20 bugs and two vulnerabilities.
A new study conducted by HP found that every one of 10 tested smartwatches contain significant vulnerabilities, including poor authentication, lack of encryption and privacy issues.
Four RCE zero-days plague Internet Explorer. The vulnerabilities were disclosed by HP after Microsoft missed the patch deadline.

SecurityWeek Experts

rss icon

Wade Williamson's picture
While malware is obviously a critically important tool in the attacker’s arsenal, it is just one of many that make sophisticated attacks successful.
Joshua Goldfarb's picture
Security is most definitely a stressful business. It’s all too easy to get caught up in day-to-day activities and to forget to come up for air.
David Holmes's picture
Whether Shodan's John Matherly intends it to or not, Shodan is already exposing the sham of consumer-grade security that we all suspected would be a hallmark of The Internet of Things.
Alan Cohen's picture
Cyber security is a nation-first, vendor-second issue. Recent events have frighteningly underscored the requirement to fundamentally rethink our approach to information security lest our economy, our very way of life suffer drastically.
Adam Ely's picture
The increase in mobile security conversations shows that teams are still trying to figure out their strategy and how to address this new landscape of vulnerabilities.
Rafal Los's picture
Often times it’s the insiders that enable the external attacker – either willingly or otherwise, and the result can be even more devastating than that of an external attacker.
Travis Greene's picture
Can IT security find a way to coexist with wearables faster than the first BYOD war and avoid a second war?
Mark Hatton's picture
Unfortunately, when it comes to security, what you’ve accomplished means very little. It’s all about where the vulnerabilities still exist.
Scott Simkin's picture
In the moments after a breach, security teams will often focus on the event itself, but not draw additional insight from the attack, or analyze the events surrounding it.
Jason Polancich's picture
With your own internal cyber bounty program designed to reward your best assets at their positions, you can begin to see real results against attackers and build a team that will compete over the long haul.