Security Experts:

More Security Headlines

The Red Alert 2.0 Android Trojan first detailed in September last year is currently available for rent on underground forums at $500 per month, Trustwave reports. [Read More]
Cisco on Wednesday released patches for over 30 security vulnerabilities in its products, including Critical flaws impacting NX-OS Software. [Read More]
Google this week announced it is adding a small amount of security metadata on top of APKs distributed by Google Play, to verify their authenticity. [Read More]
Microsoft this week announced the public preview of new Azure tools that should help its customers eliminate easily guessable passwords from their environments. [Read More]
Israel-born startup Intsights Cyber Intelligence has raised $17 million in a Series C funding round led by Tola Capital. [Read More]
Cybersecurity start-up NanoLock Security announced a new lightweight security platform designed to add security into IoT devices, rather than to overlay security around those devices. [Read More]
The Quick Look mechanism on macOS, which allows users to check file contents without actually opening the files, may leak information on cached files, even if they reside on encrypted drives or if the files have been deleted. [Read More]
Thousands of mobile applications running on iOS and Android have reportedly exposed over 113 gigabytes of data from 2,300 unsecured Firebase databases. [Read More]
A Massachusetts man pleaded guilty to his role in an ATM “jackpotting” operation, the United States Department of Justice announced this week. [Read More]
The author of a newly discovered malware downloader allows interested parties to set up a botshop and build a malware distribution network, Netscout Arbor reveals. [Read More]

SecurityWeek Experts

rss icon

Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”
Marc Solomon's picture
Automating threat intelligence prioritization also allows you to proactively deploy the right intelligence to the right tools with greater speed and confidence.
Ashley Arbuckle's picture
Managed security services are now evolving to managed detection and response (MDR) services that include security monitoring, advanced threat detection, and incident readiness and response.
Joshua Goldfarb's picture
When an organization controls its security technology portion size, it enables the organization to better address strategic requirements and to work far more efficiently.
John Maddison's picture
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.
Jalal Bouhdada's picture
Jalal Bouhdada, Founder and Principal ICS Security Consultant at Applied Risk, discusses the physical and cyber security threats facing the increasingly smart car.
Josh Lefkowitz's picture
With so many intelligence teams blinded by vast amounts of data and an overwhelmingly complex threat landscape, establishing the right intelligence requirements (IRs) can be challenging.
Steven Grossman's picture
The typically fragmented “best of breed” security architecture of many large enterprises results in protective gaps, vendor management challenges and finger pointing.
Stan Engelbrecht's picture
The principles of automation and orchestration are necessary to counter the skills and resource gap, and their impact is amplified when applied across the broader picture of cybersecurity, compliance, risk and case management.
Alastair Paterson's picture
By closely following trends watching for new activities and actors across a variety of data sources, security professionals can continue to take steps to mitigate the digital risk to their enterprises, partners and customers.