Security Experts:

More Security Headlines

Researcher earns $9,000 for finding serious access control bypass vulnerabilities in Slack, including one that could have been used for account hijacking [Read More]
Twitter, GitHub and several other major websites are inaccessible for many users due to a DDoS attack on Dyn’s Managed DNS infrastructure [Read More]
R3 announced that its Corda platform source code will be released as open-source to the Hyperledger project -- a Linux Foundation Collaborative Project seeking to advance blockchain technology. [Read More]
U.S. Department of Defense awards $7 million to HackerOne and Synack to help it launch more bug bounty programs similar to Hack the Pentagon [Read More]
Admiral Michael Rogers, Director of the U.S. National Security Agency (NSA) and Commander, U.S. Cyber Command to Keynote SecurityWeek's 2016 ICS Cyber Security Conference on Oct. 25 [Read More]
Website builder service Weebly confirms data breach. Details of over 43 million users stolen by hackers [Read More]
US prosecutors are expected to file espionage charges against Harold Martin III who served as a private contractor for the National Security Agency. He is suspected of stealing an "astonishing quantity" of classified information. [Read More]
Exploit found in the wild for local privilege escalation vulnerability in the Linux kernel, sarcastically dubbed “Dirty COW” and tracked as CVE-2016-5195 [Read More]
The Sarvdap spambot has been checking the IP addresses of infected hosts against common blacklists, in an attempt to ensure that its spam email is successfully delivered, Palo Alto Networks security researchers say. [Read More]
Lexmark patches critical vulnerability in Markvision Enterprise printer management software [Read More]

SecurityWeek Experts

rss icon

Ashley Arbuckle's picture
What it takes to operate security operation center (SOC) effectively has changed in this ever-evolving threat landscape, putting an even greater burden on analysts and the technologies they rely upon.
Marie Hattar's picture
Marie Hattar of Ixia looks at the growing armies of botnets, and how their tactics can be nullified using intelligent IP address filtering.
Lance Cottrell's picture
OODA loop is a well established concept often used in security which originated in the military. OODA stands for Observe, Orient, Decide, Act.
David Holmes's picture
Password proliferation is bad, for many, many, many reasons. But the worst reason is that people tend to re-use passwords all over the place.
Jim Ivers's picture
Mature organizations should adopt a blended approach that employs testing tools at various stages in the development life cycle.
Travis Greene's picture
Two-factor authentication (2FA) is becoming more mainstream for businesses; however, businesses need to consider how 2FA should be implemented to maintain both external and internal control.
Adam Meyer's picture
One key aspect of making threat intelligence practical is to ensure the intel is evaluated. What do I mean by this?
Rocky DeStefano's picture
Hadoop — with its ability to ingest, process and provide analytics for nearly untold amounts of data — is being adopted to solve many of the cybersecurity challenges we face.
Alastair Paterson's picture
Employees who have reused corporate emails and passwords for personal use can put their employers at risk of account takeovers, credential stuffing and extortion attempts.
Erin O’Malley's picture
A security delivery platform delivers visibility into lateral movement of attackers, accelerates detection of data theft activity, and can reduce the overhead, complexity, and costs associated with security deployments.