Security Experts:

More Security Headlines

Bromium has introduced a new security offering that integrates endpoint threat isolation, threat analysis, and continuous host monitoring to help organizations lock down their systems. [Read More]
Google this week said it would stop accepting display ads built in Adobe Flash starting on June 30, 2016, with plans to completely remove them from its platforms by January 2, 2017. [Read More]
The international nature of the encryption market makes mandatory encryption backdoors pointless, study shows [Read More]
Tollgrade patches serious vulnerabilities in its LightHouse SMS power distribution monitoring software [Read More]
Rules announced for Pwn2Own 2016, where hackers will be awarded a $75,000 bonus for escaping a VMware virtual machine [Read More]
Cisco releases software updates to patch a remote code execution vulnerability in security devices running ASA software [Read More]
Facebook has paid out more than $4.3 million since the launch of its bug bounty program, $936,000 of which in 2015 [Read More]
Google is boosting the security of its Gmail service in an effort to keep them protected from phishing attacks, malware, and other threats. [Read More]
The activity of the Dyre Trojan has come to an apparent stop since mid-November, with no new spam campaigns to distribute it observed ever since, security researchers note. [Read More]
US agents cannot access a telephone used by the Islamist attackers in the San Bernardino shooting, the head of the FBI said Tuesday, complaining that encryption is hampering investigations. [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
Enforcing security at the DNS layer is essential for identifying and containing malware infections that use DNS to execute their mission.
Bill Sweeney's picture
Cyber defense will continue to make the transition from IT problem to boardroom matter. Leading companies have already recognized this and we’ve passed the inflection point towards universal acceptance.
Jim Ivers's picture
Experienced organizations learn that security is not a drag on performance, but can provide productivity gains by eliminating security vulnerabilities early in the development process.
David Holmes's picture
During the public beta of Let’s Encrypt, it may simply be that people believe it will work. Belief works for medicine, but not for security. One way or the other, we’ll know soon.
Torsten George's picture
Threat intelligence has little value unless it is put into context of an organization’s security posture. Most enterprises don’t have the resources to apply the required logic to correlate external threat data with their internal security intelligence.
Alan Cohen's picture
Traditional incident management approaches that rely on network monitoring and detection of attacks are also falling short in today’s agile and distributed computing world.
Wade Williamson's picture
Asking for security backdoors that only benefit the good guys is like asking for bullets that only hurt the bad guys. That’s simply not how encryption works.
Tim Layton's picture
By understanding your adversaries’ activity on the Dark Web , you can take more of a proactive approach that helps reduce uncertainty and improves overall cyber resiliency.
Alastair Paterson's picture
As security professionals, it’s our job to enable business while protecting it; embracing social media is an imperative, but we also need to mitigate the exploitation of what our organizations reveal online.
Joshua Goldfarb's picture
Every organization will have its limitations and resource constraints. But that doesn’t mean the organization should aim solely for "good enough" security.