Security Experts:

More Security Headlines

Carrier grade NATs (CGNs) used by some ISPs allow dozens, hundreds and perhaps even thousands of routers or computers or mobile devices to share a single IP address simultaneously. [Read More]
Oracle released its Critical Patch Update (CPU) for October 2017 to address a total of 252 security vulnerabilities across multiple product families. [Read More]
Duo Security, a cloud-based provider of identity and access management solutions, has raised an additional $70 million in funding, bringing the total amount raised by the company to $119 million, with a post-money valuation pegged at $1.17 billion. [Read More]
China-linked cyber espionage group uses recently patched .NET vulnerability in attacks aimed at a US shipbuilding firm and a university with military ties [Read More]
Many victims of the Equifax hack had their personal information stolen by cybercriminals prior to the breach, IRS says [Read More]
Attackers may have stolen information on unpatched vulnerabilities after hacking a Microsoft bug tracker back in 2013 [Read More]
A recently discovered piece of malware targeting automated teller machines (ATM) is being sold on underground markets for $5,000, Kaspersky Lab reports. [Read More]
The continuing battle between the U.S. government and Microsoft over access to private emails stored in Ireland is going to the Supreme Court. The case was accepted by the Supreme Court on Monday. [Read More]
IT security professionals, particularly executives, admit snooping on the corporate network, One Identity study shows [Read More]
The Linux kernel is susceptible to a local escalation of privilege impacting the Advanced Linux Sound Architecture (ALSA), Cisco warns. [Read More]

SecurityWeek Experts

rss icon

Jennifer Blatnik's picture
By taking what you know about security in the physical world and logically applying it to the virtual world, you can effectively protect your personal information.
Rafal Los's picture
With the many strategy development workshops in which I’ve successfully engaged, it’s hard to believe how many companies struggle with stakeholders as a starting point.
Justin Fier's picture
When third-parties are integrated onto the network, threats are bound to slip through the cracks, and the Equifax hack demonstrated how easy it is for a subtle threat to develop into a debilitating data breach.
Travis Greene's picture
If awareness isn’t working to change the behavior of employees and consumers, is there anything that can be done?
Galina Antova's picture
Following these prescriptive steps can help do something about the state of security in your own ICS network environment.
Marie Hattar's picture
Moving applications and content out to the edge of the network in cellular base stations is making some CSOs at large enterprises nervous.
Ashley Arbuckle's picture
If you’re among the majority taking an architectural approach to consolidate security vendors then remember, your best defense is a good offense.
Marc Solomon's picture
How do you determine the amount and mix of data that’s “just right” for your organization? To answer this question it helps to understand what’s driving the need for data in the first place.
Preston Hogue's picture
As security professionals, it’s on us to understand the business implications of those conveniences and the impact they may have.
Joshua Goldfarb's picture
A seat at the security table should not be for only the elite and largest of businesses or security vendors. The time has come to democratize security.