Security Experts:

More Security Headlines

Researchers from Core Security have identified a vulnerability that can be remotely exploited for denial-of-service (DoS) attacks against certain Android devices.
The official NFL Mobile application exposes users' personal details, Wandera researchers warn just a few days before Super Bowl.
Google says it's no longer practical to fix vulnerabilities in older version of Android WebView and some experts believe it's a wise decision.
An an outage at Facebook on Jan. 26 was not the result of a third party attack, Facebook said, but occurred after the company introduced a change that affected its configuration systems.
Symantec has published a new whitepaper detailing the activities of a threat group dubbed by the security firm “Waterbug.”
PFP Cybersecurity, a Washington, D.C.-based cybersecurity startup, is taking a unique approach to detecting malware and threats within the IT supply chain as well as critical infrastructure such as industrial control systems.
A new survey underscores the security challenges the Internet of Things is posing to enterprise networks.
NSA offered organizations a set of best practices for defending against malware attacks.
The head of the CIA's secret intelligence operations plans to step down just as the spy agency weighs an unprecedented shake-up of the organization, officials said Monday.
The vulnerabilities disclosed last week by Google and the Thunderstrike flaw detailed in December by a researcher have been reportedly fixed by Apple in OS X Yosemite 10.10.2 beta.

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
The past few decades in the information security field have been dominated by passive failure. Clearly, not every new idea has merit, but those ideas that come about scientifically and methodically have tremendous potential to improve the state of security.
Rebecca Lawson's picture
As we enter the New Year, it’s time to reflect on these latest occurrences and consider what they may lead to in the year that lies ahead.
Nate Kube's picture
There are interesting lessons learned from IT IPS experiences that OT can benefit from. The first is to understand how attackers have bypassed traditional IPS IT solutions.
Scott Gainey's picture
Several financial analyst firms concluded extensive studies, surveying over a thousand CIOs and CSOs cumulatively, to gain a better understanding of how these breaches are impacting spending behaviors.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
Torsten George's picture
With cyber criminals increasingly targeting third-party vendors to gain backdoor access to data at large, well-protected global organizations, security professionals need to rethink their vendor risk management practices.
Danelle Au's picture
A data breach plan lays out the key steps and the key personnel to involve when a data breach happens, and needs to incorporate three elements.
Joshua Goldfarb's picture
At a high level, "big data" and "security analytics" are about the two very different, somewhat diametrically opposed, but equally important concepts of collection and analysis.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.