Security Experts:

More Security Headlines

Microsoft patches 60 vulnerabilities, including two zero-day flaws affecting Windows and Internet Explorer [Read More]
Tech companies could face fines of up to AUD$10 million (US $7.3 million) if they fail to hand over customer information or data to Australian police under tough cyber laws unveiled Tuesday. [Read More]
If mobilized, the unit would provide network security and cyber defense operations in support of the Department of Defense early next year at Fort Meade, Maryland. [Read More]
Researchers discover three more speculative execution vulnerabilities in Intel CPUs. The flaws are tracked as Foreshadow and L1TF and several tech giants have already released advisories, updates and mitigations [Read More]
A vulnerability in Microsoft's Active Directory Federation Services (ADFS) allows any attacker in the same organization with a valid second factor to access any other user's account if they can obtain that user's credentials. [Read More]
Exabeam, a San Mateo, California-based provider next-gen security information and event management (SIEM) platform, has closed $50 million in Series D funding. [Read More]
Adobe patches nearly a dozen vulnerabilities in Flash Player, the Creative Cloud Desktop Application, Experience Manager, and Acrobat and Reader [Read More]
The UK Metropolitan Police Service has introduced a new homemade portable fingerprint scanner that can search the Criminal Records Office (IDENT1) and immigration enforcement (IABS) databases for fingerprint matches. [Read More]
Researchers disclose details of new attack method that can be used to decrypt communications. Products from Cisco, Huawei, ZyXEL and Clavister are affected [Read More]
U.S. Department of Defense invites experts to hack the Marine Corps in new bug bounty program [Read More]

SecurityWeek Experts

rss icon

Torsten George's picture
The Reddit data breach illustrates the importance of rolling out an approach designed to verify the user, validate their device, limit access and privilege, and learn and adapt to new risks.
Jalal Bouhdada's picture
Wireless IIoT solutions are fast to deploy, but companies must gauge whether they are an appropriate solution based on a number of different factors.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Alastair Paterson's picture
A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource Planning (ERP) applications at risk of cyber attacks.
Laurence Pitt's picture
People are becoming complacent and ignoring the basic lessons we learned decades ago. Technology has advanced immensely since 1990 when the term “cybersecurity” arrived on the scene.
Preston Hogue's picture
To combat today’s constantly innovative information warfare, CISOs need diversity on their teams, because everyone has their expertise, but also their blind spots.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.
Mike Fleck's picture
Big companies can say they are GFPR compliant, but odds are their current structure will never allow them to find, identify, and categorize all the data that they have collected over time.
Marc Solomon's picture
Know your adversaries and yourself are the fundamentals – the first steps of many in the “art of war” with respect to cybersecurity.
Ashley Arbuckle's picture
Whether you work with in-house security resources or outside consultants, security experts are essential to help uncover vulnerabilities and offer recommendations to prioritize and mitigate risks.