Security Experts:

More Security Headlines

In an effort to boost the fight against malicious software, anti-malware company Avast this week announced the release of its retargetable machine-code decompiler as open source. [Read More]
Cisco announces availability of Security Connector, an iOS app that gives organizations visibility and control for mobile devices [Read More]
Severe vulnerability found by researchers in Fortinet’s FortiClient endpoint protection product can be exploited to obtain VPN authentication credentials [Read More]
Internet traffic for major tech firms such as Google, Apple, Facebook and Microsoft was briefly rerouted to Russia in a BGP attack [Read More]
A letter made public Wednesday in Waymo's civil suit against Uber over swiped self-driving car secrets confirmed the ride-share service is the target of a US criminal investigation. [Read More]
The US Army will soon send teams of cyber warriors to the battlefield as the military increasingly looks to take the offensive against enemy computer networks. [Read More]
US officials unveiled criminal charges against three individuals in the Mirai botnet attacks which shut down parts of the internet in several countries starting in mid-2016. [Read More]
Spider ransomware uses decoy documents auto-synced to enterprise cloud storage and collaborations apps. [Read More]
Greece's Supreme Court ordered that a Russian accused of laundering $4 billion using bitcoin digital currency be extradited to the United States, a court source said. [Read More]
Singapore’s Ministry of Defence invites 300 white hat hackers to take part in a two-week bug bounty program with rewards of up to $15,000 [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
There’s no reason that 2018 should be another year where attackers continue to successfully exploit the known.
Alan Cohen's picture
While the overwhelming array of choices has given technologists a lot to evaluate, they have not gone far enough to lower the actual security risk facing organizations.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.
Joshua Goldfarb's picture
Many organizations seem to focus almost entirely on technological solutions to tactical problems, rather than on strategically addressing how they can best and most efficiently protect data.
David Holmes's picture
The "Reaper" IoT botnet is holding itself up as a blinky light in front of our faces, reminding the InfoSec community that we really need to get ahead of IoT madness.
Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Marie Hattar's picture
Without visibility, your security teams are more likely to over or under invest in your company’s security infrastructure. That is a big risk to take.
John Maddison's picture
Cybercriminals have begun to leverage automation and machine learning in their attack tactics, techniques, and procedures (TTP).
Markus Jakobsson's picture
While there are no signs today of criminals consolidating and reselling data from different breaches, it is an obvious concern as the value-add of the packaging would be substantial.
Justin Fier's picture
Organizations still using the legacy approaches from a year ago to five years ago are consistently outpaced and forced to play catch-up.