Security Experts:

More Security Headlines

A Danish citizen pleaded guilty to selling a spyware application and was ordered to pay a $500,000 fine.
Researchers have created custom malware samples in an effort to test the effectiveness of some top advanced persistent threat (APT) attack detection appliances.
While Home Depot and Staples say cyber liability insurance will mitigate the financial impact of data breaches they suffered, adoption of cyber insurance generally appears to be mixed.
Canada-based industrial connectivity solutions provider MatrikonOPC has released a software update to address a vulnerability affecting OPC Server for DNP3 (Distributed Network Protocol).
ProtectV for Service Providers gives service providers the ability to offer enhanced data protection and access control to their customers when storing their data in cloud and virtual environments.
The creators of the Android remote administration tool (RAT) called DroidJack started off as legitimate application developers, but when they realized that their products were not as successful as they had hoped, they turned to developing a crimeware tool.
Researchers at FireEye say the APT3 group is now using exploits for recently-patched Windows vulnerabilities.
A10 Networks has launched a new version of its Thunder Threat Protection System (TPS) solution with improvements in programmability, mitigation, detection and visibility.
Adobe Systems issued a security update today for Flash Player users on Mac, Windows and Linux.
As the holiday shopping season kicks off, cyber-criminals will be taking advantage of heavy traffic and increased sales to launch their malicious campaigns, and security teams need to be alert for suspicious activity, experts warned.

SecurityWeek Experts

rss icon

Jon-Louis Heimerl's picture
Credit card security really is easier than it sounds. Some of this stuff is easy once you are set up.
Tal Be'ery's picture
Passwords needs to be strong enough to resist a guessing attack, often named a "Brute-force" attack. The brute-force attack comes in two flavors: online and offline.
David Maman's picture
Moving sensitive data into the hands of third-party cloud providers expands and complicates the risk landscape in which companies operate every day.
Pat Calhoun's picture
A growing number of corporate IT and security personnel have something in common with extreme athletes: they take unnecessary security risks.
Scott Gainey's picture
Panic triggers a response that often leads to potentially catastrophic mistakes. Those mistakes come as we grasp for short-term fixes that give us a stronger sense of control, but don’t take long term consequences into account.
James McFarlin's picture
Was the plan by the Securities Industry and Financial Markets Association (SIFMA) to create a new inter-agency working group comprised of data security regulators a reaction to the recent acceleration of nationwide data breaches?
Marc Solomon's picture
While we can’t address security without technology, we also need to consider education. Organizations must also be committed to keeping their IT security staff highly trained on the current threat landscape and advanced approaches to security.
Eddie Garcia's picture
By default, Hadoop is not secure and simply trusts that users are who they say they are. Within real business use cases, especially when confidential and sensitive data sets are involved, restricting access to only authorized users is critical.
Nate Kube's picture
I would like the OT security community to move away from asking what can we do to gain greater adoption of a greenfield IT security model and instead ask how we can gain demonstrable gains in OT security posture more efficiently.
Scott Simkin's picture
As more organizations build applications other than Web and corporate email into the course of their business, adversaries are taking note and adjusting their tactics.
view counter