Security Experts:

More Security Headlines

Google has used its Safe Browsing infrastructure to analyze the attacks launched recently against GitHub and GreatFire using a new censorship enforcement tool of the Chinese government dubbed "Great Cannon."
Emails to and from President Barack Obama were read by Russian hackers last year in a breach of the White House's unclassified computer system, according to a report.
The U.S. Department of Defense (DoD) on Thursday unveiled its latest cyber strategy, described as a way to guide the development of DoD's cyber forces and strengthen its cyber defense and cyber deterrence posture.
Data breach laws vary from country to country, and should some the approach of organizations, according to experts at the RSA conference.
Based on their analysis of the Dorkbot, RageBot, Phorpiex, and IRCBot.HI botnets, Zscaler researchers have determined that IRC-based botnets are still effective and they continue to evolve.
Neustar has published its North America DDoS Attacks & Impact Report for 2014. Companies are better equipped to handle DDoS attacks compared to last year.
SAP patches Adaptive Server Enterprise (ASE) flaw that can be exploited to gain access to database servers. The vulnerability was discovered by Trustwave researchers.
A recently disclosed critical vulnerability in Magento is being exploited in the wild. There are still nearly 100,000 unpatched online shops.
Russian hackers were able to access an unclassified Pentagon computer network earlier this year, US Secretary of Defense Ashton Carter said.
US Defense Secretary Ashton Carter will head to Silicon Valley on Thursday in a bid to recruit tech gurus for the Pentagon, even if just on a part-time basis.

SecurityWeek Experts

rss icon

Jason Polancich's picture
In reality, the beauty of threat intelligence is much more than skin deep. Open source data is just a small part of the threat intelligence picture.
Marc Solomon's picture
To reduce time to detection and time to resolution, threat intelligence must be tactical, contextual, automated, and easily shared.
Travis Greene's picture
The recent development of the democratization of Machine Learning is an indication that it’s time to consider adding it to our security arsenal, as it offers an opportunity to more dynamically measure risk.
Rafal Los's picture
As a potential buyer and consumer of security solutions, how do you know what technologies, products and services will address your needs?
Danelle Au's picture
As long as companies continue to pay ransoms when attacked, we should expect cyber extortion to continue in 2015.
David Holmes's picture
Will containers replace traditional operating system virtualization in the same way that virtualization has replaced much of the physical, bare-metal world? And how secure are containers, anyway?
Joshua Goldfarb's picture
Tree rings occur when the growing season ends and growth stops. To avoid stagnation, a security organization must never stop growing.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Pat Calhoun's picture
While individual products and technologies are important weapons, they operate in a silo and lose sight of the bigger picture. The reality is that you can’t just rely on a single defense or a silver bullet.
Torsten George's picture
These four cyber security building blocks can help organizations can fulfill their requirements for quantitative risk reporting and neutralize the impact of cyber-attacks.