Security Experts:

More Security Headlines

German Chancellor Angela Merkel's office asked the US ambassador to come in to discuss new allegations of NSA spying, which threaten to drive a new wedge through transatlantic ties.
Cisco Unified Communications Domain Manager platform software is plagued by a vulnerability that allows a remote attacker to gain root privileges on the system.
A hacker claims to have stolen customer data and software from Plex. He threatens to leak the information if he is not paid 9.5 Bitcoins.
Harvard University has been hacked. A security firm reported seeing spam emails carrying Dyre malware coming from Harvard’s systems.
The PCI Council has announced updates to the Point-to-Point Encryption (P2PE) and device security standards.
Donald Trump’s hotels may have been targeted by cybercriminals. Possible credit card breach investigated.
Level 3 Communications has paid an undisclosed cash sum to acquire Black Lotus, a provider of Distributed Denial of Service (DDoS) mitigation services.
Deutsche Telekom has teamed up with Intel Security to develop and deploy honey pots that can be embedded in any device, including smartphones and other connected (IoT) devices.
A vulnerability in the 802.11n wireless networking standard can be exploited by a remote attacker to target wireless networks.
Amazon has launched s2n, a new open source implementation of TLS. s2n is designed to be small, fast, simple and secure.

SecurityWeek Experts

rss icon

Adam Ely's picture
The increase in mobile security conversations shows that teams are still trying to figure out their strategy and how to address this new landscape of vulnerabilities.
Rafal Los's picture
Often times it’s the insiders that enable the external attacker – either willingly or otherwise, and the result can be even more devastating than that of an external attacker.
Travis Greene's picture
Can IT security find a way to coexist with wearables faster than the first BYOD war and avoid a second war?
Mark Hatton's picture
Unfortunately, when it comes to security, what you’ve accomplished means very little. It’s all about where the vulnerabilities still exist.
Scott Simkin's picture
In the moments after a breach, security teams will often focus on the event itself, but not draw additional insight from the attack, or analyze the events surrounding it.
Jason Polancich's picture
With your own internal cyber bounty program designed to reward your best assets at their positions, you can begin to see real results against attackers and build a team that will compete over the long haul.
Marc Solomon's picture
Cybercrime-as-a-Service is increasing the sophistication and frequency of attacks to the point where they seem to be pervasive. When evaluating your approach to security in light of this increasingly popular approach to attacks, seek out solutions that are equally pervasive.
Joshua Goldfarb's picture
When moving to the cloud, companies must understand the implications, enumerate the risks, and mitigate those risks accordingly.
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
Wade Williamson's picture
In light of the seemingly endless parade of high-profile breaches, it’s easy to focus on external threats, while losing sight of insider threats.