Security Experts:

More Security Headlines

NVIDIA patches 8 DoS and privilege escalation vulnerabilities, including ones rated high severity, in GeForce, NVS, Quadro and Tesla GPU display drivers [Read More]
According to a new report, an average of 1.385 million unique new phishing sites are created every month, peaking at 2.3 million in May 2017. [Read More]
D-Link patches most of the DIR-850L router vulnerabilities disclosed recently by a researcher [Read More]
As the clock ticks down to elections Sunday, Germany's cyber defense nervously hopes it'll be third time lucky after Russia was accused of meddling in the US and French votes. [Read More]
Fuzzing conducted by Google Project Zero revealed more than 30 vulnerabilities in Chrome, Firefox, IE, Edge and Safari engines [Read More]
Judge dismisses three of the six counts in the FTC case against D-Link over its alleged failure to secure cameras and routers [Read More]
Attacks involving a rather unknown information stealing malware family dubbed FormBook have become increasingly frequent recently, fueled by the threat’s cheap price and the availability of a cracked builder. [Read More]
A helpdesk vulnerability exposes the internal communications of hundreds of companies, researcher warned [Read More]
New campaigns using the FinFisher spyware are using a previously unseen infection vector, strongly suggesting that Internet service providers (ISPs) might be involved in the distribution process [Read More]
The hack disclosed at the U.S. Securities and Exchange Commission deals a fresh blow to confidence in the security of the financial system weeks after news of a potentially catastrophic breach at a major US credit bureau. [Read More]

SecurityWeek Experts

rss icon

Siggi Stefnisson's picture
SSL encryption can create blind spots in many organizations, as malware in the HTTPS channel is essentially hidden from most web security tools.
Marc Solomon's picture
With the sheer volume of threat data continuing to climb at a staggering rate, security teams need to start with the threat – automating how we gather, score and prioritize threat intelligence.
Ashley Arbuckle's picture
MSSPs help alleviate the complexity of maintaining and managing a proliferation of security products and point solutions in order to get their full value.
Jennifer Blatnik's picture
If the rest of the community would give hackers more of a chance before writing them off as evildoers, there would potentially be more incentives for capable people to go into the white hat hacking business.
Alan Cohen's picture
There are different types of segmentation architectures: network centric, hypervisor centers, or distributed. Let’s take a look at each one and review the puts and takes of each approach.
Markus Jakobsson's picture
While 2FA is a big step above and beyond the use of traditional passwords, it is not infallible, and thinking so makes the risk of failure even greater.
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Galina Antova's picture
From the boardroom to the security operations center, lip service can no longer be paid to ICS/critical infrastructure/OT cybersecurity.
Joshua Goldfarb's picture
Benchmarking is about understanding how people use a variety of different products and services, what challenges they use them to address, and how those products and services fit into the organization’s security strategy.
Josh Lefkowitz's picture
Regardless of the extent to which your organization shares information, there’s a lot we can all learn from the WireX botnet takedown.