Security Experts:

More Security Headlines

CERT details the Accellion File Transfer Appliance vulnerabilities uncovered by a researcher while trying to hack a Facebook server [Read More]
Vulnerability in PL/SQL Developer allows MitM attackers to deliver malware and execute arbitrary commands [Read More]
Microsoft offering up to $15,000 for serious vulnerabilities in the Nano Server installation option of Windows Server 2016 [Read More]
Qatar National Bank said that its systems are "fully secure" following a hacker attack that resulted in a large number of files allegedly stolen from the financial institution’s systems being leaked online. [Read More]
Fortinet has unveiled its new Fortinet Security Fabric architecture and a powerful new FortiGate 6000 series firewall designed to tackle the increasing demands from encrypted network traffic. [Read More]
Experts comment on the Bangladesh Bank hack and its implications for the financial industry [Read More]
IBM analyzes three alternatives to GM Bot, an Android banking trojan currently offered for $15,000 [Read More]
Researchers from Intel Security discovered a piece of malware dubbed "Dynamer" that is taking advantage of a Windows Easter Egg called “God Mode” to gain persistency on an infected machine. [Read More]
Developers expose sensitive business information by leaking Slack authentication tokens on GitHub [Read More]
Despite it's privacy and end user security benefits, SSL and TLS traffic encryption brings its own problems for businesses. Encryption is already used by criminals to hide malicious traffic on the basis that defenders cannot find what they cannot see. [Read More]

SecurityWeek Experts

rss icon

Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Avi Chesla's picture
Security technologies must be provisioned with the right policy in order to ensure it complements the neighboring solution, and must also be activated in the right sequence.
Jim Ivers's picture
Developers are not trained in security and security is not yet an adequately integrated component of the development process. We are not applying good, or even minimal, security practices.
Scott Simkin's picture
Threat intelligence is only valuable if an organization takes the necessary steps to quickly and easily apply that intelligence to actual security policy.
Shlomo Kramer's picture
When it comes to deciding why you should re-evaluate security vendors, the solution’s roadmap is of strategic importance because it may require technical analysis and rethinking of the overall network security architecture.
Emily Ratliff's picture
Writing yet another “security” paper isn’t going to do the trick. Security practitioners need to do a better job of getting our messages integrated into core developer documentation.
Adam Meyer's picture
Gaining awareness of supply chain risks and addressing them in the context of broader risk management programs will put organizations in a much better position when it comes to managing their cyber risk.
Alan Cohen's picture
By utilizing security technologies that are “invisible” to the infrastructure, you can reduce, rather than add to, IT and security’s burdens.
Alastair Paterson's picture
Failure to secure sensitive information during the M&A process opens the door to threat actors looking to profit by exploiting financial markets and proprietary intellectual property (IP).
Travis Greene's picture
When big stories like the release of the Panama Papers breaks, it is an opportunity to self-evaluate what level of risk your organization could be exposed to.