Security Experts:

More Security Headlines

ABB is working to patch a serious arbitrary code execution vulnerability in its Panel Builder 800 tool. Until a fix becomes available, the company has provided some mitigations [Read More]
Cisco finds and patches critical flaws in Policy Suite, and high severity flaws in SD-WAN, WebEx Network Recording Player, and Nexus 9000 switches [Read More]
A SpiderLabs security researcher has published details of what he considers to be a vulnerability in the RLM web application provided by Reprise Software. Reprise CEO Matt Christiano has told SecurityWeek, it is not a vulnerability. [Read More]
NIST’s Computer Security Division decided to withdraw 11 outdated SP 800 publications on August 1, 2018 [Read More]
Integris Software, a Seattle-based provider of data privacy automation tools, today announced that it has raised $10 million through a Series A financing round led by Aspect Ventures. [Read More]
Flashpoint announces new service designed to help organizations respond and prepare for ransomware and other cyber extortion incidents [Read More]
Oracle patched a total of 334 security vulnerabilities with its July 2018 Critical Patch Update (CPU), with 200 of the bugs said to be remotely exploitable without authentication. [Read More]
Cryptominers have plateaued, GandCrab is the new king of ransomware, adware -- surprise! -- is as prolific as ever, and VPNFilter might herald a new genre of sophisticated multi-purpose malware. [Read More]
Microsoft announces new identity bug bounty program, with rewards of up to $100,000 for flaws that can be used to bypass multi-factor authentication and vulnerabilities in the design of OpenID and OAuth 2.0 standards [Read More]
Siemens has updated its Meltdown and Spectre security bulletin to inform customers of the recently discovered variants, specifically LazyFP and Spectre 1.1 [Read More]

SecurityWeek Experts

rss icon

Laurence Pitt's picture
Safeguarding emerging IoT ecosystems involves embedding visibility and protection into the fabric of the IoT network.
Alastair Paterson's picture
Given the uncertain future of dark web marketplaces and the clandestine nature of insider activity, specialized insider marketplaces are emerging.
Lance Cottrell's picture
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
Erin O’Malley's picture
When ransomware strikes, there aren’t many options for response and recovery. Essentially, you can choose your own adventure and hope for the best.
Marc Solomon's picture
The human element will always remain vital in security operations, but automation will allow us to move through processes faster for better decisions and accelerated action.
Ashley Arbuckle's picture
We’ve seen an evolution from more traditional simulation exercises that use a Red Team to identify vulnerabilities and launch mock attacks and a Blue Team to detect and respond to attacks, to Purple Teaming exercises.
Steven Grossman's picture
Adding automation to the incident response process requires consideration of the possible threat vectors and the associated actions necessary to respond to those vectors.
Rafal Los's picture
Boards used to care only about one thing - that your company didn't get breached on their watch. Those days, sadly, are behind us.
John Maddison's picture
Analysis of a vendor’s underlying design and optimization approaches will enable you to select the solution that best meets your organization’s performance and budgetary requirements.
Joshua Goldfarb's picture
In security, one of our goals should always be to broaden our perspective, field of view, and horizons to minimize the risk that we will be blindsided by something we didn’t see coming.