Security Experts:

More Security Headlines

A presentation on cracking the anonymity of the TOR network scheduled to be held at the upcoming Black Hat USA conference in Las Vegas has been cancelled.
Several undocumented forensic services running on all iOS devices can be leveraged as attack points and surveillance mechanisms, a security researcher revealed at the Hope X conference.
IBM is advising the owners of certain KVM switches to update the firmware on their devices to address a total of three security holes that can be exploited remotely.
SMS-based two-factor authentication (2FA) mechanisms used by banks to secure their customers' accounts have been bypassed by cybercriminals using a combination of malware, mobile apps, rogue DNS servers, and phishing sites, according to a report from Trend Micro.
The Splunk App for Enterprise Security 3.1 has introduced a new risk scoring framework to enable easier, faster threat detection and containment by empowering users to assign risk scores to any data.
A survey of nearly 5,000 IT security professionals around the globe revealed that 31 percent of cyber-security teams never speak with their executive team about cyber-security.
A new file-encrypting piece of ransomware advertised on underground forums since mid-June is increasingly used by cybercriminals, a security expert reported.
Four recently-patched OpenSSL vulnerabilities have been found to affect several industrial products from Siemens.
Unknown hackers hijacked the official Facebook page of the Wall Street Journal on Sunday and posted fake headlines.
Protecting of point-of-sale systems requires security professionals educate themselves about the PoS architecture, according to AccessData's Lucas Zaichkowsky.

SecurityWeek Experts

rss icon

Torsten George's picture
When an organization is solely focused on strengthening its compliance posture to pass an audit, they primarily look at control failures and gaps and try to mitigate them.
Mark Hatton's picture
You need to identify your security shortcomings before someone else does. Simulate attacks and tests to associate known vulnerabilities, previous attack patterns, and security/network data to identify potential attack paths to your company’s most important data.
Marc Solomon's picture
To help cybersecurity professionals cut through the hype and gain a better understanding of what to expect as the Internet of Everything continues to evolve, these top 10 observations might help.
Adam Ely's picture
Yesterday’s device management approach does not work in a BYOD world. The end users are bringing their own devices, so we need to adjust to accommodate this new world order.
Joshua Goldfarb's picture
An organization that keeps records of its security incidents should be able to study that data to understand the top ways in which it is generally becoming compromised.
Jason Polancich's picture
In order to make our ecosystem a safer place for all of us, small and large, the big guys out there are going to have to start - at least in part - handling the security of their small business partners, suppliers and customers.
Rebecca Lawson's picture
As enterprises made trade-offs in security; either sacrifice performance in order to add more layers of security beyond the traditional stateful firewall or don’t implement the new protections necessary to protect against many of the latest threats.
Danelle Au's picture
As the era of Internet of Things dawns, the amount of data and other cloud applications developed for unique industries will increase and bring a new era of privacy and security concerns.
Wade Williamson's picture
The most important aspect for us as security professionals is to realize that the man-in-the-browser is not going away, and to understand what exactly has made it so successful.
Adam Ely's picture
Security teams and lines of business have reached a turning point on BYOD. It’s now become more important than ever for the CISO to figure out how to manage risk without inhibiting users.