Security Experts:

More Security Headlines

FireHost has $25 million in a Series E funding round led by its longtime investor, The Stephens Group.
Barack Obama will not visit China on his Asia tour next week, but its broadening shadow will be cast everywhere he goes at a time of complex regional disputes and questions about US strategy.
Hackers targeted the website of Oman's official news agency, singling out and mocking Algeria's newly re-elected president Abdelaziz Bouteflika as a handicapped "dictator".
Kaspersky Lab announced major leadership changes to its North American operations this week, while at the same time revealing its strategic plans for expansion in the enterprise IT security market.
According to researchers at Mandiant, now a unit of FireEye, an attacker was able to leverage the Heartbleed vulnerability against a customers’ VPN appliance and hijacked multiple active user sessions.
A report from the GAO highlights cyber-security issues tied to the SEC's lack of oversight of a contractor during a system migration.
Attackers are shifting away from traditional botnet-based distributed denial of service attacks in favor of other techniques to launch larger attacks, Akamai Technologies said in its latest report.
Security vulnerabilities in many satellite telecommunications systems leave them open to hackers, raising potential risks for aviation, shipping, military and other sectors.
Edward Snowden joined a phone-in with Russian President Vladimir Putin, quizzing him over the extent of Moscow's surveillance activities.
Microsoft has updated its threat modeling tool with a number of new features.

SecurityWeek Experts

rss icon

Marcus Ranum's picture
When you start your metrics program, you'll find that a great deal of information can be gleaned from existing data that gets stored in various places – most likely in your system logs.
Chris Hinkley's picture
The most advanced technology in the world is only as good as the people and systems behind it. Otherwise your sophisticated security device is nothing more than a paperweight.
Danelle Au's picture
Trying to defend against modern, advanced attacks with one-off point solutions is like playing a whack-a-mole game, always one step behind the attacker and trying to play catch up with the alerts as they’re received.
Mark Hatton's picture
The oversight for the protection of healthcare information is only getting tighter, and it is incumbent upon the security teams to ensure healthcare professionals have all the tools necessary to improve patient outcomes, while we worry about keeping the bad guys away.
Nimmy Reichenberg's picture
By properly segregating the network, you are essentially minimizing the level of access to sensitive information for those applications, servers, and people who don’t need it, while enabling access for those that do.
Tal Be'ery's picture
The Target breach shows that APT attacks have commoditized and therefore should concern not only the government and defense industry, but probably every enterprise.
Torsten George's picture
The NIST Cybersecurity Framework is a good first step towards creating a standardized approach to cyber security, but requires many substantial updates before really improving our nation’s cyber resilience.
Wade Williamson's picture
If criminals can’t use or sell stolen data without being caught, then the data quickly becomes worthless. As a result it’s critical to understand what happens to data after a breach.
Marc Solomon's picture
The energy sector requires an approach to cybersecurity that doesn’t rely exclusively on air gaps or point-in-time detection tools but addresses the full attack continuum – before, during, and after an attack.
Marcus Ranum's picture
There are many important and useful tools related to the metrics landscape; let's take a look at some of them and how they fit together.