Security Experts:

More Security Headlines

The move by CrowdStrike to join VirusTotal is a positive sign that at least one next-gen vendor is willing to integrate into the overall anti-malware market for the benefit of all users. [Read More]
Apple has fixed vulnerabilities exploited by a piece of high-end surveillance software, which researchers classify as “the most sophisticated attack seen on any endpoint. [Read More]
St. Jude stock plunges after a security firm discloses vulnerabilities in the company’s medical devices as part of an investment strategy [Read More]
Vulnerabilities in BTS (base transceiver station) products could allow a malicious attacker to gain remote control of the transceiver module, which would result in a compromise of the BTS functionalities. [Read More]
Millennium Hotels & Resorts North America is investigating a possible PoS breach at 14 hotels in the United States. The incident may be related to the recent Oracle MICROS breach [Read More]
Security researchers managed to successfully crack the newly spotted Alma ransomware and provide victims with the option to decrypt their files for free. [Read More]
Vulnerabilities found by researchers in the Micro Focus GroupWise collaboration tool expose organizations to remote attacks [Read More]
French defense contractor DCNS has been hit by a massive leak of 22,400 leaked pages of secret data on its submarines. [Read More]
Hackers have stolen 25 million user accounts from Mail.Ru domains, but the Internet company says the compromised credentials are invalid [Read More]
Cisco has started releasing updates for its ASA software to address the vulnerability used in the recently leaked NSA-linked exploit [Read More]

SecurityWeek Experts

rss icon

Adam Meyer's picture
With any cyber security-related capability, you need to answer the “so what” question. What does any of this intelligence mean? And does it help us achieve the desired outcome(s)?
Alastair Paterson's picture
Developing awareness about dual revenue attacks is the first step in preparing your organization to deal with these threats.
Eddie Garcia's picture
This article explains how to encrypt data in a Hadoop cluster. The tools are available, and if you are brave enough, you could attempt this at home.
Torsten George's picture
Relying solely on existing intelligence provided by vulnerability scanners should only be a first step in a cyber risk management process.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Erin O’Malley's picture
To understand SIEM, it’s important to first understand when people started to care about network security. And to do that, we need to take a step back in time.
Jennifer Blatnik's picture
Listen to your coach. Similar to the Olympics, a CSO or CISO needs to be able to lead their team and consider the impact they will have on the broader organization.
Joshua Goldfarb's picture
Even the best security analysts need high quality, high fidelity base points/jumping off points from which to enter into productive, value-added work.
Nathaniel Gleicher's picture
Cybersecurity defenders face a similar problem to the Secret Service: they are defending high-value assets that must be protected, but also have to speak to hundreds or thousands of other servers.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.