Security Experts:

More Security Headlines

ICS-CERT issued an advisory about an ongoing attack campaign targeting industrial control systems that is believed to have been active since at least 2011.
A report released by the California Office of the Attorney General on Tuesday shows that the number of residents affected by data breaches in 2013 increased considerably compared to the previous year.
Amit Yoran has been appointed President of RSA and will oversee the company’s products, marketing, sales and services.
A researcher has identified a flaw that can be exploited to trick certain ASUS wireless routers into updating their firmware to old or potentially malicious versions.
A serious vulnerability has been discovered in a File Transfer Protocol (FTP) client used by many Unix-like (*NIX) operating systems, representatives of the NetBSD Project reported.
North Korea attempted to hack tens of thousands of South Korean smartphones this year, using malware disguised in mobile gaming apps, the South's spy agency said in a report.
White House technicians recently detected suspicious activity on a computer network at the US presidential mansion, and have taken steps to resolve the issue, an official said Tuesday.
A Massachusetts man was sentenced to nearly two years for his role in the attempted theft of $15 million.
A reconnaissance framework documented by researchers earlier this year has been used by multiple threat groups in watering hole attacks targeting organizations in various sectors.
The phishing campaign was first spotted in mid-October, and leverages vulnerabilities in unpatched versions of Adobe Reader.

SecurityWeek Experts

rss icon

Marc Solomon's picture
Recent high-profile security breaches at major retailers stem from the fact that in-store networks and their components are evolving and spawning a range of attack vectors.
Joshua Goldfarb's picture
When looking to measure the success and progress of a security program, it is important to think about what success and progress actually mean.
Danelle Au's picture
Cloud adoption should be a collaborative rather than prescriptive process between employees and IT. With the right mindset and strategy, what employees want and what IT wants can become a proper union in a Venn diagram.
Jason Polancich's picture
Your employees, partners, customers and suppliers are your “survival group” battle-buddies now and it’s important to know how the zombies behave and where they hide.
Travis Greene's picture
IAM is sometimes forgotten in the discussion of controls. However, it’s best to have these conversations when planning and evaluating controls, rather than after a breach.
James McFarlin's picture
A bountiful source of innovative new products for mature security providers lies in the hunting ground of promising newer firms.
Adam Firestone's picture
The imposition of externally-defined cybersecurity methodologies and solutions on both government and critical infrastructure programs hasn’t proven effective. Fortunately, the political and technical winds are shifting
Torsten George's picture
To limit the risk of having drive-by malware attacks planted on their websites, organizations should monitor the payload of their different Internet properties, which for larger organizations can easily become a huge undertaking.
Joshua Goldfarb's picture
As information security professionals, it is tempting to become enamored with the beauty or elegance of a technical solution, analytical technique, or investigative outcome.
Scott Simkin's picture
The network edge is the ideal location for quickly preventing the vast majority of attacks, but looking forward, you should consider how pervasive deployments can stop the new breed of advanced attack.