Security Experts:

More Security Headlines

A threat group breached a company’s webmail server and used the access to steal credentials and maintain persistence.
The nuclear industry still doesn’t fully understand the risk posed by cyberattacks, according to a new report from Chatham House.
North Korea is suspected of having launched a cyber attack last year on the South Korean capital's subway system that carries millions of commuters every day, a Seoul lawmaker said Monday, citing intelligence reports.
iOS malware dubbed YiSpecter abuses private APIs and enterprise certificates to infect jailbroken and non-jailbroken devices.
A serious vulnerability has been found in the Jetpack plugin for WordPress. Developers patch issue in version 3.7.1.
US online brokerage firm Scottrade said Friday it was notifying some 4.6 million customers about a hack into its database which could have leaked private information.
T-Mobile's chief executive has expressed outrage over a breach at a credit monitoring service Experian that exposed private data from 15 million customers of the mobile carrier.
Experian on Thursday announced that a server containing information on T-Mobile customers was compromised, and that information of roughly 15 million individuals has been exposed.
A senior software engineer at Google detailed on Thursday the steps taken by the Internet giant to disrupt a bank phishing campaign targeting Android users in Russia.
A mysterious piece of malware has infected tens of thousands of devices across the world, but its operator hasn’t used it for any malicious purposes.

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
Let’s face it. Most people in the world in which we live are not very security literate. To learn security lessons from the “unwashed masses”, we must first understand what security means to them.
Rafal Los's picture
It’s your job to understand your limitations on the understanding of risk and to responsibly formulate defensible calculations that drive your tactics and strategy. Using “probability” as a metric is not only black magic, but it’s going to give you the wrong answer.
Travis Greene's picture
The true value of identity is not in creating more defense in depth, which means that identity is not the new perimeter.
Wade Williamson's picture
For CISOs and security directors, recruiting and retaining talent for their security teams is more challenging than keeping pace with technology.
Jason Polancich's picture
Even some of the most “well-to-do” of companies often skimp on cyber defense or simply don’t prioritize it sufficiently.
David Holmes's picture
If LE succeeds, it might influence the rest of the CA industry to get its act together. It might drive many of the slightly sketchy bargain CA companies out of the market.
Torsten George's picture
IoT opens up companies all over the world to more security threats, and only time will tell if the IoT vendor community can come together to create a common security framework that helps shrink the security risk iceberg and minimize the risk of cyber-attacks.
Marc Solomon's picture
The global cybersecurity skills shortage isn’t going away any time soon. But by attacking it on multiple fronts we can proactively work to address it
Eduard Kovacs's picture
US intel chief warns that Russian hackers have been targeting critical infrastructure ICS. Security experts say the threat is real.
Alan Cohen's picture
Insecurity of any time stems from a common psychological cause -- fear. Fear is generally a reaction to something immediate that threatens your security or safety. Fear itself can harm one’s judgment and prevent teams from taking action.