Security Experts:

More Security Headlines

BitTorrent has provided additional details on Bleep, an encrypted voice and messaging application which, unlike similar solutions, doesn't rely on central servers.
A security firm uncovered three zero-day vulnerabilities in Symantec Endpoint Protection that can be exploited for privilege escalation.
Israel-based threat detection firm Seculert has been monitoring the effects of the recent Gameover Zeus and Shylock botnet takedown operations, and found that the cybercriminals have already taken steps to resurrect their campaigns.
Deloitte's Cyber Risk Services group has launched new “cyber war-gaming and simulation services” that aim to unite those tasked with managing enterprise-wide responses to cyber-attacks.
Kaspersky Lab dives deeper into an attack campaign also known as 'Energetic Bear' that has been targeting industries ranging from the energy sector to the manufacturing business since 2010.
A flaw in mGuard series industrial security routers from Innominate Security Technologies could be exploited remotely by an unauthenticated attacker to obtain configuration information.
IBM has acquired CrossIdeas, a privately held provider of Access Governance software that helps organizations manage user access to applications and data across on-premise and cloud environments.
Akamai Technologies has joined Microsoft and venture capital firm Jerusalem Venture Partners (JVP) in the cybersecurity startup accelerator program launched recently in Israel.
Microsoft will challenge a US court order requiring it to give prosecutors electronic mail content associated with an overseas server in a data center in Dublin.
A global survey conducted by data protection solutions provider SafeNet once again confirms that data breaches, especially ones that involve financial data, have a negative impact on customer loyalty.

SecurityWeek Experts

rss icon

James McFarlin's picture
One can only hope our nation’s alarm clocks wake up and stir our national leaders’ imaginations before a cyber incident of the magnitude of 9/11 results in the need for a “Cyber Strikes Commission Report.”
Adam Ely's picture
This shift to mobile exposes a major fault that needs to be addressed and security practices must address mobile threats as well.
Travis Greene's picture
There is pressure for IT to deliver access to information from anywhere, on any device, without security hassles. Yet complaints about security hassles cannot dictate excessive risk exposure.
Joshua Goldfarb's picture
I am often asked the question: “Is security an unsolvable problem?” In order for me to answer that question, I would have to understand it, and I don’t.
Danelle Au's picture
Enterprises can gain tremendous competitive advantages by having IT focus on the things that matter – users and information rather than infrastructure maintenance and building.
Jon-Louis Heimerl's picture
Cybercrime “case studies” are always impersonal, right? Would you get more out of specific stories of individuals caught in the cross hairs instead of corporate entities?
Pat Calhoun's picture
The need for extreme network protection may be the driving force behind your decision to invest in a next-generation firewall (NGFW), but your enterprise also has other factors to consider.
Torsten George's picture
When an organization is solely focused on strengthening its compliance posture to pass an audit, they primarily look at control failures and gaps and try to mitigate them.
Mark Hatton's picture
You need to identify your security shortcomings before someone else does. Simulate attacks and tests to associate known vulnerabilities, previous attack patterns, and security/network data to identify potential attack paths to your company’s most important data.
Marc Solomon's picture
To help cybersecurity professionals cut through the hype and gain a better understanding of what to expect as the Internet of Everything continues to evolve, these top 10 observations might help.