Security Experts:

More Security Headlines

NIST’s Computer Security Division decided to withdraw 11 outdated SP 800 publications on August 1, 2018 [Read More]
Integris Software, a Seattle-based provider of data privacy automation tools, today announced that it has raised $10 million through a Series A financing round led by Aspect Ventures. [Read More]
Flashpoint announces new service designed to help organizations respond and prepare for ransomware and other cyber extortion incidents [Read More]
Oracle patched a total of 334 security vulnerabilities with its July 2018 Critical Patch Update (CPU), with 200 of the bugs said to be remotely exploitable without authentication. [Read More]
Cryptominers have plateaued, GandCrab is the new king of ransomware, adware -- surprise! -- is as prolific as ever, and VPNFilter might herald a new genre of sophisticated multi-purpose malware. [Read More]
Microsoft announces new identity bug bounty program, with rewards of up to $100,000 for flaws that can be used to bypass multi-factor authentication and vulnerabilities in the design of OpenID and OAuth 2.0 standards [Read More]
Siemens has updated its Meltdown and Spectre security bulletin to inform customers of the recently discovered variants, specifically LazyFP and Spectre 1.1 [Read More]
An ongoing espionage campaign aimed at Ukraine is leveraging three different remote access Trojans (RATs), ESET security researchers warn. [Read More]
President Donald Trump found himself isolated and under pressure to reverse course after publicly challenging the US intelligence conclusion that Russia meddled in the 2016 election during his face-to-face with Vladimir Putin. [Read More]
Colton Ray Grubbs of Kentucky admitted in a U.S. court to developing and distributing the LuminosityLink remote access Trojan. [Read More]

SecurityWeek Experts

rss icon

Galina Antova's picture
In assessing industrial cyber risk and prioritizing your remediation steps, it can be difficult to even determine where to begin.
Josh Lefkowitz's picture
It’s imperative that security practitioners acknowledge the often-confusing nature of insider threat, seek to dispel misconceptions, and provide clear, accurate insight whenever possible.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
Laurence Pitt's picture
While awareness is key and technology is a great assistant, there is one simple practice we can all adopt: think before you click or share.
Alastair Paterson's picture
Threat modeling is an iterative process that needs to be updated whenever there are substantial changes to either assets or threats.
Preston Hogue's picture
Securing applications and understanding vulnerabilities in code and IT systems will always be important. But today security pros must open their eyes to a much bigger picture.
Bradon Rogers's picture
Industrial IoT in the enterprise expands the threat landscape by opening up new vulnerabilities that can be exploited across endpoints, applications, cloud infrastructure and networks.
Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”
Marc Solomon's picture
Automating threat intelligence prioritization also allows you to proactively deploy the right intelligence to the right tools with greater speed and confidence.
Ashley Arbuckle's picture
Managed security services are now evolving to managed detection and response (MDR) services that include security monitoring, advanced threat detection, and incident readiness and response.