Security Experts:

More Security Headlines

Prosecutors said Olayinka Olaniyi and co-defendant 29-year-old Damilola Solomon Ibiwoye ran several phishing scams targeting employees at U.S. colleges and universities. [Read More]
At the Black Hat conference, IBM presented a way that hackers could create a new class of malware uses AI to hide a malicious payload invisibly within a benign, popular application [Read More]
NetComm patches critical vulnerabilities in 4G LTE Light industrial M2M routers. The flaws can be exploited remotely to completely compromise a device [Read More]
An investigation found that many Google services on Android devices and iPhones store your location data even if you've used privacy settings that say they will prevent it from doing so. [Read More]
Researchers show how hackers could target urban water utilities through the smart irrigation systems used by their customers [Read More]
Check Point researchers show how cyber criminals could infiltrate a home or corporate network by exploiting all-in-one printer-fax machines. [Read More]
A recently patched security vulnerability in the Kaspersky VPN application for Android resulted in DNS addresses being exposed. [Read More]
Oracle informed users late on Friday of a critical Database vulnerability that should be patched ASAP. Flaw can lead to complete compromise of Database and shell access to underlying server [Read More]
A publicly accessible Amazon S3 bucket was found storing documents apparently detailing GoDaddy infrastructure running in the Amazon AWS cloud, UpGuard reveals. [Read More]
The U.S. is bracing for cyberattacks Iran could launch in retaliation for the re-imposition of sanctions this week by President Donald Trump [Read More]

SecurityWeek Experts

rss icon

Jalal Bouhdada's picture
Wireless IIoT solutions are fast to deploy, but companies must gauge whether they are an appropriate solution based on a number of different factors.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Alastair Paterson's picture
A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource Planning (ERP) applications at risk of cyber attacks.
Laurence Pitt's picture
People are becoming complacent and ignoring the basic lessons we learned decades ago. Technology has advanced immensely since 1990 when the term “cybersecurity” arrived on the scene.
Preston Hogue's picture
To combat today’s constantly innovative information warfare, CISOs need diversity on their teams, because everyone has their expertise, but also their blind spots.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.
Mike Fleck's picture
Big companies can say they are GFPR compliant, but odds are their current structure will never allow them to find, identify, and categorize all the data that they have collected over time.
Marc Solomon's picture
Know your adversaries and yourself are the fundamentals – the first steps of many in the “art of war” with respect to cybersecurity.
Ashley Arbuckle's picture
Whether you work with in-house security resources or outside consultants, security experts are essential to help uncover vulnerabilities and offer recommendations to prioritize and mitigate risks.
Joshua Goldfarb's picture
Whether you’re speaking at a conference, presenting in a meeting, working the room at an industry session, or otherwise, researching the audience pays huge dividends.