Security Experts:

More Security Headlines

SAP has released patches to address vulnerabilities in several of the company’s products [Read More]
The IRS discovered that identity thieves attempted to generate E-File PINs using 464,000 stolen social security numbers [Read More]
Siemens releases firmware update to address DoS and replay protection vulnerabilities in SIMATIC PLCs [Read More]
Microsoft’s February 2016 Patch Tuesday updates include 13 bulletins that fix serious vulnerabilities in Windows, Edge, Internet Explorer and Office [Read More]
Adobe has released security updates and hotfixes to patch vulnerabilities in Flash Player, Photoshop, Bridge, Connect, and Experience Manager [Read More]
A fake CloudFlare DDoS (distributed denial of service) check page is being used by a Nuclear exploit kit (EK) gate to load a malicious redirection page to serve malware, according to security firm Malwarebytes. [Read More]
President Barack Obama on Tuesday unveiled a new cybersecurity "national action plan" calling for an overhaul of aging government networks and a high-level commission to boost security awareness. [Read More]
A group of pro-Palestine hackers leaked the details of nearly 30,000 DHS and FBI employees. The DoJ is investigating [Read More]
Twitter has suspended over 125,000 accounts for threatening or promoting terrorist acts, the social media company recently announced. [Read More]
Trane has patched a serious vulnerability in one of its smart thermostats nearly two years after learning of its existence [Read More]

SecurityWeek Experts

rss icon

Travis Greene's picture
The investment in access certifications have reduced the workload on IT, but by treating all entitlements and users the same, we’ve put the burden on LOB managers to manage the risk of excessive access.
Johnnie Konstantas's picture
DLP provides a range of business benefits, including compliance support and intellectual property protection. The concept isn’t a new one, but the ability to put it to use in an easier, more viable manner is.
Scott Gainey's picture
Companies need educate employees about ransomware, and the techniques criminals use to launch attacks such as phishing emails or distribution through social media channels.
Marc Solomon's picture
Hackers are hijacking legitimate online resources to launch campaigns that ultimately show them the money.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.
Jim Ivers's picture
Built in or bolted on? When have you ever seen “bolted on” as the first choice of anyone in just about any imaginable scenario? Yet for software security, “bolted on” is certainly the norm.
David Holmes's picture
After designating 2014 as “The Year of the Mega-Breach,” the security community hoped to bring awareness to the challenge of protecting customer data. As it turns out, the breaches of 2015 make the previous year’s ones pale in comparison.
Wade Williamson's picture
Specific malicious payloads, URLs and IP addresses are so ephemeral that they may only be used once in the case of a true targeted attack. Intelligence should make you better prepared to evaluate and solve new problems that you haven’t encountered before.
Bill Sweeney's picture
Alert monitoring should entail an assessment of effectiveness and a realization that increasing volumes can't be managed by overwhelmed staff. How can your team cut through the noise and better-manage security alerts?
Joshua Goldfarb's picture
The best security professionals understand that there are some things that money just cannot buy. Relationships.