Security Experts:

More Security Headlines

A researcher has identified a series of vulnerabilities on a Yahoo service that ultimately allowed him to gain root access to one of the company's servers.
Duo Security, a provider of cloud-based two-factor authentication solutions, has raised $12 million in Series B funding, led by venture capital firm Benchmark.
CloudFlare's Keyless SSL innovation allows customers to take advantage of the company's solutions without ever having to hand over their private SSL keys.
Boeing announced that it will open a Cyber Analytics Center located in Singapore, to bring cybersecurity capabilities and services to customers in the Asia-Pacific region.
Israeli Prime Minister Benjamin Netanyahu has launched a National Authority for Cyber Defense to oversee the protection of both military and civilian systems.
FireEye has announced new offerings designed to provide customers with on-demand access to its cyber defense technology, intelligence, and analysts expertise on a subscription basis.
Researchers at Malwarebytes noticed earlier this week that the websites of The Times of Israel and The Jerusalem Post had been serving malicious ads as part of a malvertising campaign that appears to involve several threat actors.
What types of security solutions should have been used by Home Depot? What are best practices for avoiding such incidents? What steps should the retail industry take? These are just some of the questions answered by members of the security industry.
Apple has addressed more than 40 vulnerabilities affecting components such as PHP, Bluetooth, the CoreGraphics framework, the Intel graphics driver, the Foundation framework, IOKit, IOHIDFamily, IOAcceleratorFamily, the kernel, OpenSSL, QT Media Foundation and Ruby.
Google, Dropbox, the Open Technology Fund and several security researchers have joined forces for a new initiative that focuses on usable secure technologies.

SecurityWeek Experts

rss icon

Wade Williamson's picture
As we build more accessible, scalable, and efficient computing models, we likewise open ourselves up to attacks that are likewise more accessible, scalable and efficient.
Marcus Ranum's picture
A few years ago, there was a bit of discussion about improving security. A number of researchers' systems and faculty systems had been compromised, and “something must be done” - but what?
Marc Solomon's picture
Thanks to significant technological advances what we can do is use knowledge of the past and the present to drive a desired future outcome. That capability is extremely important for better security given today’s threat landscape and the vicious cycle defenders face.
Adam Ely's picture
At the end of the day, the kill switch will not only decrease the amount of people mugged for their phones because there is little net value in the device itself, but it will also provide individuals with the means to wipe the device of personal information.
Joshua Goldfarb's picture
Although it may be tempting to envision a world where the analyst has been fully automated, this does not seem particularly reasonable.
Pat Calhoun's picture
Being connected is critical and all the elements of an organization’s security platform should work in concert together to provide adaptive security for the entire environment.
James McFarlin's picture
With risks to national and economic security increasing, other avenues of cyber defense are receiving attention. Improving resilience and the promising application of predictive analysis to the prevention of cyberattacks before they occur are two such areas
Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Travis Greene's picture
If you can’t interpret user activity with the context of identity and what is normal behavior, your organization may be living with a false sense of security, providing a significant window of opportunity for attackers.
Mark Hatton's picture
it’s hard to build continuity under inconsistent leadership. It’s also really hard to beat the hackers when the person responsible for keeping them at bay has less job security than an NFL coach with a losing record.