Security Experts:

More Security Headlines

Several BGP daemon vulnerabilities patched in Quagga, a routing software used by several Unix platforms [Read More]
The United States, Canada, Australia and New Zealand have joined the U.K. in blaming Russia for the destructive NotPetya attack launched last summer [Read More]
A United States Judge sent two Russian nationals to prison for their involvement in a hacking scheme that compromised roughly160 million credit card numbers and incurred losses of hundreds of millions. [Read More]
Dispel launches platform designed to help secure elections, including voter, ballot and campaign information [Read More]
The new and emerging world of artificial intelligence -- that is, algorithms -- promises huge benefits for industry in increased speeds and lower costs; just as it does in the financial markets. [Read More]
The newly discovered DoubleDoor Internet of Things (IoT) botnet is using two exploits to ensure it can bypass authentication on targeted devices and render additional protections useless. [Read More]
Security experts earned more than $100,000 for over 100 vulnerabilities reported as part of the Hack the Air Force 2.0 bug bounty challenge [Read More]
Malware researchers tend to stop short of saying, 'this country or that actor is behind this attack'. Nevertheless, they are not shy in dropping hints, leaving the reader to make subjective conclusions. [Read More]
Intel opens bug bounty program to all researchers and offers up to $250,000 for side-channel vulnerabilities like Spectre and Meltdown [Read More]
UK officially accuses the Russian government of being behind the NotPetya attack, which cost major organizations millions [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
With the right technologies and/or services, every organization can get relevant, prioritized threat intelligence how, when and where they need it.
Ashley Arbuckle's picture
While it’s easy to deploy new IT services, many of the security tools and processes that we’ve used in our networks and data centers will not work in public clouds.
Joshua Goldfarb's picture
I’d like to share some of the observations I’ve made throughout the years around behaviors that aggravate the “culture clash” between salespeople and security practitioners.
Galina Antova's picture
Standards have helped keep the domain from being completely exposed to the growing threat, but standards have by no means kept pace with threat actors.
Stan Engelbrecht's picture
Responding to an incident can require extreme time-sensitivity and when tensions are running high, it’s easy to miss something important along the way.
Jim Ivers's picture
The software that controls our infrastructure is vulnerable to attack, and the potential results are far more destructive and pervasive than even science fiction would have us believe.
John Maddison's picture
Digital transformation is creating a whole new set of risks that, especially where critical infrastructure is involved, could have potentially devastating consequences.
Steven Grossman's picture
Symantec Senior VP of Information Protection, Nico Popp speaks to Steven Grossman on the challenges enterprises are facing to support collaboration, cloud adoption, remote connectivity, and mobile computing.
Preston Hogue's picture
The new world of security is a more streamlined model that involves transferring many types of risk—and many of the associated controls—to third parties in a variety of ways.
Justin Fier's picture
The insider threat is under-scrutinized by the security community, leaving networks vulnerable to compromise by their own employees, especially those with privileged access.