Security Experts:

More Security Headlines

Despite it's privacy and end user security benefits, SSL and TLS traffic encryption brings its own problems for businesses. Encryption is already used by criminals to hide malicious traffic on the basis that defenders cannot find what they cannot see. [Read More]
Researchers at F5 Networks are warning of a new campaign of the Dridex web fraud malware targeting U.S. financial institutions. [Read More]
It took Microsoft only 7 hours to patch a serious Office 365 vulnerability that could have been exploited to hack into accounts [Read More]
Google on Thursday released an updated version of Chrome 50 for Windows, Mac, and Linux, to resolve 9 security vulnerabilities in the popular web browser. [Read More]
Facebook said it had received 13 percent more government requests for user data in the second half of 2015, with more than 46,000 requests worldwide. [Read More]
The PCI Security Standards Council (PCI SSC) has published PCI Data Security Standard (PCI DSS) version 3.2. [Read More]
Symantec on said that President and Chief Executive Officer Michael Brown will be stepping down as head of the security firm after a successor has been appointed. [Read More]
The US military's secretive Cyber Command (CYBERCOM) is working to destroy the Islamic State group's Internet connections and leave the jihadists in a state of "virtual isolation," Pentagon chiefs said. [Read More]
OpenSSL will patch high severity vulnerabilities with the release of versions 1.0.2h and 1.0.1t on March 3 [Read More]
A new version of the NTP daemon patches several low and medium severity vulnerabilities [Read More]

SecurityWeek Experts

rss icon

Avi Chesla's picture
Security technologies must be provisioned with the right policy in order to ensure it complements the neighboring solution, and must also be activated in the right sequence.
Jim Ivers's picture
Developers are not trained in security and security is not yet an adequately integrated component of the development process. We are not applying good, or even minimal, security practices.
Scott Simkin's picture
Threat intelligence is only valuable if an organization takes the necessary steps to quickly and easily apply that intelligence to actual security policy.
Shlomo Kramer's picture
When it comes to deciding why you should re-evaluate security vendors, the solution’s roadmap is of strategic importance because it may require technical analysis and rethinking of the overall network security architecture.
Emily Ratliff's picture
Writing yet another “security” paper isn’t going to do the trick. Security practitioners need to do a better job of getting our messages integrated into core developer documentation.
Adam Meyer's picture
Gaining awareness of supply chain risks and addressing them in the context of broader risk management programs will put organizations in a much better position when it comes to managing their cyber risk.
Alan Cohen's picture
By utilizing security technologies that are “invisible” to the infrastructure, you can reduce, rather than add to, IT and security’s burdens.
Alastair Paterson's picture
Failure to secure sensitive information during the M&A process opens the door to threat actors looking to profit by exploiting financial markets and proprietary intellectual property (IP).
Travis Greene's picture
When big stories like the release of the Panama Papers breaks, it is an opportunity to self-evaluate what level of risk your organization could be exposed to.
Joshua Goldfarb's picture
Cyber insurance, like any tool, will not solve all of an organization’s problems. But it can help an organization round out its risk mitigation strategy.