Security Experts:

More Security Headlines

BlackBerry is calling the DTEK50 'the world's most secure Android Smartphone'. It comes with Android Marshmallow 6.0 underwritten by BlackBerry's security experience. [Read More]
Kimpton Hotels & Restaurants investigating possible payment card breach following reports of unauthorized charges [Read More]
Xen Project releases patches for two vulnerabilities, including a serious flaw that allows a guest to host escape [Read More]
Researchers identify several vulnerabilities in the home and pro versions of Osram’s Lightify smart connected lights [Read More]
Researchers at Arbor Networks managed to crack the heavy obfuscated domain generation algorithm (DGA) of Mad Max, a targeted Trojan that has created a botnet of infected machines in sixteen countries. [Read More]
Lack of encryption in many wireless keyboards allows remote hackers to intercept and inject keystrokes in an attack dubbed “KeySniffer” [Read More]
Jihadist groups use a variety of digital tools and online services that allow them to maintain a strong online presence, while also helping them remain undetected by adversaries, a recent report from Flashpoint reveals. [Read More]
Cybersecurity startup SafeBreach has raised $15 million in a Series A funding round to expand its platform that provides enterprises with “hacker's view” of their security posture. [Read More]
Microsoft is launching new Microsoft Authenticator applications in popular mobile app stores to provide users with multi-factor authentication (MFA) functionality on the go. [Read More]
A flaw in the Silk browser running on Amazon Kindle allowed hackers to intercept Google search traffic [Read More]

SecurityWeek Experts

rss icon

Ken McAlpine's picture
Once you have an understanding of where your security risks are, you can make better choices about what types and what sources of threat intelligence are most applicable.
Wade Williamson's picture
It turned out to be a tricky month for security admins to take that long-awaited summer vacation because July was one of the busiest months in recent memory in terms of vulnerabilities.
Jim Ivers's picture
If a car’s systems can be hacked to disable critical systems, then attacks can also be used to extract information. Similar to IoT, if data is being collected, data can be exfiltrated.
Travis Greene's picture
Republicans and Democrats admit that the U.S. government should be doing more to reduce the burden of securing digital business. Perhaps the next president, regardless of which party wins, can find a way to make progress on these wish list items.
Adam Meyer's picture
Threat intelligence is all about reducing uncertainty. A threat intelligence plan should help you define why you are doing what you are doing from an intelligence perspective.
Alastair Paterson's picture
It's important to look at your environment through the eyes of an attacker to detect the threats and vulnerabilities relevant to your organization.
Torsten George's picture
Vulnerability assessments are often confused with penetration tests. In fact, the two terms are often used interchangeably, but they are worlds apart.
Joshua Goldfarb's picture
You’ll never see someone who solved their alert fatigue issues and runs an efficient security operations program on the six o’clock news. Hacking is sexy, but defending is an important piece of the security puzzle.
Ashley Arbuckle's picture
C-suite leaders should be thinking about cybersecurity as a strategic advantage that can set them apart from competitors.
Eddie Garcia's picture
One of the best use cases for big data is to use Hadoop for log ingestion and security analytics. Through audit, we can ensure that the security controls that are in place are working correctly and identify attempts to circumvent them.