Security Experts:

More Security Headlines

Aachen, Germany-based firm Utimaco will acquire the Atalla hardware security module (HSM) and enterprise secure key manager (ESKM) lines from UK-based Micro Focus. [Read More]
Drupal websites hacked via the Drupalgeddon2 and Drupalgeddon3 vulnerabilities deliver cryptocurrency miners, RATs and tech support scams [Read More]
Two remotely exploitable vulnerabilities that can be exploited for DoS attacks have been patched in the BIND DNS software [Read More]
A dataset allegedly containing 200 million unique sets of personally identifiable information (PII) exfiltrated from several popular Japanese website databases emerged on underground forums [Read More]
F-Secure announced on Thursday the launch of a new endpoint detection and response (EDR) solution named Rapid Detection & Response [Read More]
A misconfigured server operated by CalAmp, a company offering the backend for a broad range of well-known car alarm systems, provided anyone with access to data and even allowed for account and vehicle takeover. [Read More]
Google is putting yet another nail in the HTTP coffin: starting with Chrome 70, pages that are not served over a secure connection will be marked with a red warning. [Read More]
A 55-year-old man from New Mexico was sentenced to 15 years in prison for DDoS attacks on dozens of organizations and firearms charges [Read More]
US Justice Department announces more charges against two Syrians believed to be members of the Syrian Electronic Army hacker group [Read More]
A new variant of the Mirai Internet of Things (IoT) botnet is making the rounds, featuring new exploits in its arsenal and distributing a new bot, Fortinet researchers have discovered. [Read More]

SecurityWeek Experts

rss icon

Josh Lefkowitz's picture
While the upcoming GDPR compliance deadline will mark an unprecedented milestone in security, it should also serve as a crucial reminder that compliance does not equal security.
Laurence Pitt's picture
The rapid proliferation of connected things is leaving networks exposed with more potential entry points that are vulnerable to attack.
Alastair Paterson's picture
With domain name WHOIS data subject to the GDPR’s privacy requirements, the system will “go dark” until alternative preparations are made, creating a challenge for this who fight computer fraud and other criminal activity on the Internet.
Joshua Goldfarb's picture
We can all be more understanding of people when they do exactly what we incentivize them to do. To that point, I offer “10 security behaviors that anger us, but that we incentivize".
Erin O’Malley's picture
SecOps and NetOps are starting to put aside their differences and find ways to work better together. As Gartner reports, these once distinct groups have begun to realize and accept that alignment is not a nice to have, but a business imperative.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Marc Solomon's picture
It is important for threat intelligence analysts, SOCs and incident responders to work together to take the right actions faster, reducing the time to response and remediation.
Ashley Arbuckle's picture
We have an opportunity to expand the pool of workers and improve security and financial performance in the process, with teams that are based on inclusion and diversity.
Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.
Preston Hogue's picture
With each new digital industry, process or service comes a new data source that can be compiled and cross referenced, introducing new ways to see into people’s lives, activities and business operations.