Security Experts:

More Security Headlines

Cisco has patched a critical flaw in a unified computing solution and is preparing fixes for products affected by a recently disclosed ASN1C compiler bug [Read More]
CTB-Faker claims that users’ files were encrypted by CTB-Locker, the claim is far from true. [Read More]
The products of many major software vendors could be exposed to attacks due to vulnerabilities in Oracle’s Outside In SDKs [Read More]
There were nearly six million fraud and cyber crimes committed in the UK in the 12 months to March 2016, according to the latest figures from the Office for National Statistics (ONS) [Read More]
Developers of the popular e-commerce WordPress plugin WooCommerce patch persistent XSS flaw [Read More]
Google released Chrome 52 in the stable channel and revealed that no less than 48 security vulnerabilities were resolved in the popular web browser. [Read More]
Starting next month, the Firefox Web browser will block certain Flash content to improve the security of its users and to ensure faster page loads. [Read More]
Researchers find several critical vulnerabilities in Dell’s SonicWALL Global Management System product [Read More]
Wireless modems provided by ISPs worldwide to customers are plagued by some serious vulnerabilities [Read More]
Ukrainian Artem Vaulin, alleged to be the ringleader of the world's biggest online piracy site, Kickass Torrents, was accused of distributing over $1 billion worth of illegally copied films, music and other content. [Read More]

SecurityWeek Experts

rss icon

Jim Ivers's picture
If a car’s systems can be hacked to disable critical systems, then attacks can also be used to extract information. Similar to IoT, if data is being collected, data can be exfiltrated.
Travis Greene's picture
Republicans and Democrats admit that the U.S. government should be doing more to reduce the burden of securing digital business. Perhaps the next president, regardless of which party wins, can find a way to make progress on these wish list items.
Adam Meyer's picture
Threat intelligence is all about reducing uncertainty. A threat intelligence plan should help you define why you are doing what you are doing from an intelligence perspective.
Alastair Paterson's picture
It's important to look at your environment through the eyes of an attacker to detect the threats and vulnerabilities relevant to your organization.
Torsten George's picture
Vulnerability assessments are often confused with penetration tests. In fact, the two terms are often used interchangeably, but they are worlds apart.
Joshua Goldfarb's picture
You’ll never see someone who solved their alert fatigue issues and runs an efficient security operations program on the six o’clock news. Hacking is sexy, but defending is an important piece of the security puzzle.
Ashley Arbuckle's picture
C-suite leaders should be thinking about cybersecurity as a strategic advantage that can set them apart from competitors.
Eddie Garcia's picture
One of the best use cases for big data is to use Hadoop for log ingestion and security analytics. Through audit, we can ensure that the security controls that are in place are working correctly and identify attempts to circumvent them.
Jennifer Blatnik's picture
It's been a dirty little secret among those of us in the security industry that there are two types of security solution providers...
Jim Ivers's picture
IoT promises a lot of convenience, but there is a price to be paid if you don’t involve the best connected device ever created—your brain.