Security Experts:

More Security Headlines

LANDESK hacked. Attackers might have stolen employee personal information and even source code
Online retailer Amazon is sending emails to some of its customers, prompting them to reset their passwords, saying that they might have been compromised.
The infamous Dridex banking Trojan recently surfaced again in spam campaign runs that have managed to achieve a high infection rate, security companies are warning.
NCC Group has agreed to pay roughly $141.5 million to acquire Netherlands-based IT security firm Fox-IT.
A highly sophisticated PoS malware dubbed ModPOS has been used to target US retailers. The threat went largely undetected since early 2013
A fifth suspect has been arrested over the recent TalkTalk hack. This time it’s an 18-year-old boy from Wales suspected of blackmail
Analysis of the firmware on 4,000 IoT devices revealed the existence of hundreds of cryptographic keys that are shared across millions of hosts.
Researchers find second root certificate on Dell devices, and a tracking issue that can be used to obtain Dell service tags
Hilton Hotels said that hackers stole credit card information from some of its point-of-sale computer systems.
RSA researchers have analyzed GlassRAT, a stealthy piece of malware used in highly targeted attacks aimed at Chinese nationals in commercial organizations

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
Organizations continue to suffer from alert fatigue, making it difficult to make informed decisions in a timely manner. A narrative-driven model provides an adequate framework to support timely, actionable, and informed decisions.
Alastair Paterson's picture
Cyber Threat Intelligence (CTI) is critical for organizations that want to gain a comprehensive, tailored and relevant view of the potential threats and types of attackers that could be targeting them.
Marc Solomon's picture
The Internet of Everything is transforming our world and creating more opportunities for attackers as modern networks and their components constantly evolve and spawn new attack vectors.
Travis Greene's picture
The challenge in Information Security is recognizing how biases affect our judgment in evaluating and responding to threats and taking steps to mitigate them.
Danelle Au's picture
Attackers are thinking outside the box, using sophisticated breach methods and taking advantage of a very collaborative ecosystem. Perhaps it’s time to supplement all our security defenses with a hacker-centric security paradigm.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Jay Schulman's picture
The ability to recruit the right person for an application security role who can also find the flaws is a struggle for many organizations. These job openings rarely get filled.
David Holmes's picture
Ron Rivest, the inventor of RC4, has improved the RC4 algorithm by adding a third index variable k and moving i through the array more quickly. This new, improved RC4 is called Spritz.
Torsten George's picture
The DHS initiated the Continuous Diagnostics and Mitigation program to safeguard and secure Federal Information Technology networks. But can the DHS CDM program really strengthen the security posture of government networks?
Joshua Goldfarb's picture
Incident response is about taking action on those informed decisions. Once a threat is understood, it should be contained and remediated and security teams should respond quickly to minimize or eliminate damage to the organization.