Security Experts:

More Security Headlines

Medical device manufacturer St. Jude refutes claims that its products have serious vulnerabilities. Incident leads to trading halt [Read More]
Attackers may have gained access to Opera Sync usernames and passwords after breaching one of the company’s servers [Read More]
After an eight-month pause, the Ramnit Trojan has resurfaced with two new live attack servers and a new command and control (C&C) server, IBM researchers reveal. [Read More]
F-Secure's Chief Research Officer Mikko Hypponen coined the term 'cyber crime unicorn'. His purpose was to highlight the growing professionalism of cyber criminals; and the term caught on. [Read More]
Experts comment on the alleged hack of the NSA-linked Equation Group and the exploits leaked by Shadow Brokers [Read More]
Locky ransomware has changed its distribution method once again and is now using DLLs for infection. [Read More]
Mozilla has launched Observatory, a free tool that allows users to determine if they implemented all available security technologies on their websites [Read More]
The move by CrowdStrike to join VirusTotal is a positive sign that at least one next-gen vendor is willing to integrate into the overall anti-malware market for the benefit of all users. [Read More]
Apple has fixed vulnerabilities exploited by a piece of high-end surveillance software, which researchers classify as “the most sophisticated attack seen on any endpoint. [Read More]
St. Jude stock plunges after a security firm discloses vulnerabilities in the company’s medical devices as part of an investment strategy [Read More]

SecurityWeek Experts

rss icon

Steven Grossman's picture
With the stakes high and the sophistication of attackers at unprecedented levels, CISOs need their own cockpit that includes everything they need to manage their operation.
Adam Meyer's picture
With any cyber security-related capability, you need to answer the “so what” question. What does any of this intelligence mean? And does it help us achieve the desired outcome(s)?
Alastair Paterson's picture
Developing awareness about dual revenue attacks is the first step in preparing your organization to deal with these threats.
Eddie Garcia's picture
This article explains how to encrypt data in a Hadoop cluster. The tools are available, and if you are brave enough, you could attempt this at home.
Torsten George's picture
Relying solely on existing intelligence provided by vulnerability scanners should only be a first step in a cyber risk management process.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Erin O’Malley's picture
To understand SIEM, it’s important to first understand when people started to care about network security. And to do that, we need to take a step back in time.
Jennifer Blatnik's picture
Listen to your coach. Similar to the Olympics, a CSO or CISO needs to be able to lead their team and consider the impact they will have on the broader organization.
Joshua Goldfarb's picture
Even the best security analysts need high quality, high fidelity base points/jumping off points from which to enter into productive, value-added work.
Nathaniel Gleicher's picture
Cybersecurity defenders face a similar problem to the Secret Service: they are defending high-value assets that must be protected, but also have to speak to hundreds or thousands of other servers.