Security Experts:

More Security Headlines

Website builder service Weebly confirms data breach. Details of over 43 million users stolen by hackers [Read More]
US prosecutors are expected to file espionage charges against Harold Martin III who served as a private contractor for the National Security Agency. He is suspected of stealing an "astonishing quantity" of classified information. [Read More]
Exploit found in the wild for local privilege escalation vulnerability in the Linux kernel, sarcastically dubbed “Dirty COW” and tracked as CVE-2016-5195 [Read More]
The Sarvdap spambot has been checking the IP addresses of infected hosts against common blacklists, in an attempt to ensure that its spam email is successfully delivered, Palo Alto Networks security researchers say. [Read More]
Lexmark patches critical vulnerability in Markvision Enterprise printer management software [Read More]
A recently patched Windows zero-day vulnerability has been used by an APT actor dubbed FruityArmor for privilege escalation [Read More]
The Russian man arrested by Czech police in cooperation with the FBI is suspected of being involved in the 2012 LinkedIn hack [Read More]
Yahoo has asked US spy agencies to offer public "transparency" about data they make internet companies provide on users and to declassify any secret order served on the company. [Read More]
Microsoft’s popular text, audio and video messaging service Skype can be used to record keystrokes and reveal what a user has typed, a group of researchers say. [Read More]
Starting in Firefox 51, Mozilla’s web browser will display an error when a SHA-1 certificate is encountered that chains up to a root certificate included in Mozilla’s CA Certificate Program. [Read More]

SecurityWeek Experts

rss icon

Ashley Arbuckle's picture
What it takes to operate security operation center (SOC) effectively has changed in this ever-evolving threat landscape, putting an even greater burden on analysts and the technologies they rely upon.
Marie Hattar's picture
Marie Hattar of Ixia looks at the growing armies of botnets, and how their tactics can be nullified using intelligent IP address filtering.
Lance Cottrell's picture
OODA loop is a well established concept often used in security which originated in the military. OODA stands for Observe, Orient, Decide, Act.
David Holmes's picture
Password proliferation is bad, for many, many, many reasons. But the worst reason is that people tend to re-use passwords all over the place.
Jim Ivers's picture
Mature organizations should adopt a blended approach that employs testing tools at various stages in the development life cycle.
Travis Greene's picture
Two-factor authentication (2FA) is becoming more mainstream for businesses; however, businesses need to consider how 2FA should be implemented to maintain both external and internal control.
Adam Meyer's picture
One key aspect of making threat intelligence practical is to ensure the intel is evaluated. What do I mean by this?
Rocky DeStefano's picture
Hadoop — with its ability to ingest, process and provide analytics for nearly untold amounts of data — is being adopted to solve many of the cybersecurity challenges we face.
Alastair Paterson's picture
Employees who have reused corporate emails and passwords for personal use can put their employers at risk of account takeovers, credential stuffing and extortion attempts.
Erin O’Malley's picture
A security delivery platform delivers visibility into lateral movement of attackers, accelerates detection of data theft activity, and can reduce the overhead, complexity, and costs associated with security deployments.