Security Experts:

More Security Headlines

Intel, AMD, ARM, Apple, Amazon, Google and Microsoft respond to lawmakers’ questions regarding the disclosure of the Meltdown and Spectre CPU flaws [Read More]
GitHub this week permanently disabled a series of weak cryptographic standards across its software development platform in an attempt to better protect users. [Read More]
GitLab patches vulnerability that could have allowed hackers to hijack custom domains and point them to a malicious repository [Read More]
Helsinki, Finland-based security firm F-Secure has analyzed a random sample of incident response investigations conducted by its security consultants. [Read More]
A new business email compromise (BEC) campaign is targeting accounts payable personnel at Fortune 500 companies in an attempt to trick victims into initiating fraudulent wire transactions to attacker-controlled accounts, IBM warns. [Read More]
A newly observed variant of the infamous Mirai botnet is capable of setting up proxy servers on the infected Internet of Things (IoT) devices, Fortinet warns. [Read More]
Signal announces the launch of the Signal Foundation with a $50 million investment from Brian Acton, the co-founder of WhatsApp [Read More]
The specific disconnect is over the relative importance between anti-malware and identity control -- but it masks a more persistent issue: do business leaders even listen to their own security professionals? [Read More]
Cisco patches critical vulnerabilities in Unified Communications and Elastic Services Controller products [Read More]
Several vulnerabilities, including ones rated critical, patched in Drupal with the release of versions 8.4.5 and 7.57 [Read More]

SecurityWeek Experts

rss icon

Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Alastair Paterson's picture
With better security practices both on an individual and organizational level, you can mitigate the risk of cryptocurrency fraud while remaining an active user.
Barak Perelman's picture
While TRITON is not the first malware to target industrial control systems (ICS), it does signal that operational networks, which have been largely immune to cyber threats, are now in the crosshairs of attackers.
Marc Solomon's picture
With the right technologies and/or services, every organization can get relevant, prioritized threat intelligence how, when and where they need it.
Ashley Arbuckle's picture
While it’s easy to deploy new IT services, many of the security tools and processes that we’ve used in our networks and data centers will not work in public clouds.
Joshua Goldfarb's picture
I’d like to share some of the observations I’ve made throughout the years around behaviors that aggravate the “culture clash” between salespeople and security practitioners.
Galina Antova's picture
Standards have helped keep the domain from being completely exposed to the growing threat, but standards have by no means kept pace with threat actors.
Stan Engelbrecht's picture
Responding to an incident can require extreme time-sensitivity and when tensions are running high, it’s easy to miss something important along the way.
Jim Ivers's picture
The software that controls our infrastructure is vulnerable to attack, and the potential results are far more destructive and pervasive than even science fiction would have us believe.
John Maddison's picture
Digital transformation is creating a whole new set of risks that, especially where critical infrastructure is involved, could have potentially devastating consequences.