Security Experts:

More Security Headlines

Failed Bitcoin exchange MtGox will be liquidated after a Japanese court ordered the start of bankruptcy proceedings, said a lawyer appointed to carry out the process.
The Core Infrastructure Initiative will support open source projects that have become a critical part of computing and Internet infrastructure so that security issues can be found and remediated faster.
Rapid7, a provider of security risk and penetration testing solutions, has launched certification programs for users of Nexpose and Metasploit Pro.
A new report found that the majority of bad bots originated in the United States.
AIG has expanded its cyber insurance offering to include property damage and bodily injury that could be caused as a result of cyber attacks.
Brazil's President Dilma Rousseff took aim at US dominance of the Internet, appealing at an international meeting for global governance that would give no state greater weight than others.
Apple issued security updates for Mavericks, iOS and its AirPort Base Station.
According to analysis by researchers at FireEye, roughly 150 million downloads of Android apps contain OpenSSL libraries vulnerable to Heartbleed.
Brazil's Congress passed comprehensive legislation on Internet privacy in what some have likened to a web-user's bill of rights, after stunning revelations its own president was targeted by US cyber-snooping.
NIST has removed the Dual_EC_DRBG, or Dual Elliptic Curve Deterministic Random Bit Generator from its draft guidance on random number generators.

SecurityWeek Experts

rss icon

Marc Solomon's picture
When evaluating managed security services the following five questions can help ensure you get the support you need to stay focused on the threat.
Mark Hatton's picture
Security really is a marathon and there are no days off. Sacrifices are needed and tough decisions are required. The motto of our country’s most elite fighting force, the US Navy SEALs, is The Only Easy Day Was Yesterday.
Chris Hinkley's picture
When the development cycle moves quickly, it will often bypass security. When rapid development equates to shoehorning security controls in after the fact, we’re left with an approach that has potentially disastrous consequences.
Chris Coleman's picture
The shaping of the threat intelligence management market is critical to its success, and there is much confusion about the very term “threat intelligence.” I am a firm believer that intelligence is a process, not an individual thing, and that Intelligence is not “done.” It is “created.”
Nimmy Reichenberg's picture
Security practitioners have long had a love-hate relationship with automation, and for good reason.
Dr. Mike Lloyd's picture
The fact that insurance companies – well respected by every business-centric executive – look at cyber risk and say “no, thanks” is a pretty clear indicator that something is rotten...
Michael Callahan's picture
While attackers are constantly improving their evasion tactics to extend the lifetime of their malware, users can also leverage these types of evasion tactics to help prevent malware infection in the first place.
Torsten George's picture
A threat is the agent that takes advantage of a vulnerability. This relationship must be a key factor in the risk assessment process and can no longer be treated as risk’s neglected step child.
Mark Hatton's picture
I am painfully aware that in business and in security, hope is not a plan. However, that doesn’t mean we can’t dream a bit about the best case scenario. In the spirit of the season, here are five things I’m hoping for in the security industry this year.
Wade Williamson's picture
As enterprises become increasingly focused on security, it’s important to take an honest look not just at what security measures are in place, but how they are really used.