Security Experts:

More Security Headlines

More than 30 lawsuits have been filed against Intel by customers and shareholders over the Meltdown and Spectre vulnerabilities [Read More]
Google Project Zero discloses unpatched Edge vulnerability that can be exploited to bypass a security feature designed to prevent code execution [Read More]
Cyberattacks cost the United States between $57 billion and $109 billion in 2016, a White House report said, warning of a "spillover" effect for the broader economy if the situation worsens. [Read More]
Oracle said Thursday that it has agreed to acquire cloud security firm Zenedge for an undisclosed sum. [Read More]
"It's high time to have a serious discussion about the international legal framework in which cyberwars take place," UN secretary general Antonio Guterres said at the Munich Security Conference. [Read More]
Threat actors are exploiting a recently patched vulnerability (CVE-2017-10271) in Oracle WebLogic Server to infect systems with crypto-currency mining malware. [Read More]
BitSight has published an analysis of the security posture of the federal supply chain, which shows a significant gap between the security performance of U.S. federal agencies and their contractors. [Read More]
U.S. Department of Energy announces new Office of Cybersecurity, Energy Security, and Emergency Response (CESER) [Read More]
Several BGP daemon vulnerabilities patched in Quagga, a routing software used by several Unix platforms [Read More]
The United States, Canada, Australia and New Zealand have joined the U.K. in blaming Russia for the destructive NotPetya attack launched last summer [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
With the right technologies and/or services, every organization can get relevant, prioritized threat intelligence how, when and where they need it.
Ashley Arbuckle's picture
While it’s easy to deploy new IT services, many of the security tools and processes that we’ve used in our networks and data centers will not work in public clouds.
Joshua Goldfarb's picture
I’d like to share some of the observations I’ve made throughout the years around behaviors that aggravate the “culture clash” between salespeople and security practitioners.
Galina Antova's picture
Standards have helped keep the domain from being completely exposed to the growing threat, but standards have by no means kept pace with threat actors.
Stan Engelbrecht's picture
Responding to an incident can require extreme time-sensitivity and when tensions are running high, it’s easy to miss something important along the way.
Jim Ivers's picture
The software that controls our infrastructure is vulnerable to attack, and the potential results are far more destructive and pervasive than even science fiction would have us believe.
John Maddison's picture
Digital transformation is creating a whole new set of risks that, especially where critical infrastructure is involved, could have potentially devastating consequences.
Steven Grossman's picture
Symantec Senior VP of Information Protection, Nico Popp speaks to Steven Grossman on the challenges enterprises are facing to support collaboration, cloud adoption, remote connectivity, and mobile computing.
Preston Hogue's picture
The new world of security is a more streamlined model that involves transferring many types of risk—and many of the associated controls—to third parties in a variety of ways.
Justin Fier's picture
The insider threat is under-scrutinized by the security community, leaving networks vulnerable to compromise by their own employees, especially those with privileged access.