Security Experts:

More Security Headlines

AlienVault launches OTX Endpoint Threat Hunter, a free scanning service that allows organizations to identify threats and assess risk [Read More]
LinkedIn patches AutoFill vulnerability that could have been exploited to harvest data from users’ profiles [Read More]
Google this week announced that iOS users can now receive Google prompts via their Gmail application. [Read More]
Gold Galleon: Nigerian hackers target global maritime shipping businesses and their customers in BEC attacks [Read More]
Kaspersky launches Hybrid Cloud Security, a solution designed to protect hybrid clouds against internal and external threats [Read More]
48 million records containing detailed personal information of tens of millions of people were exposed to the Internet after data-gathering company LocalBlox left a cloud storage repository publicly available. [Read More]
Microsoft has rolled out a new Windows Defender Browser Protection extension to help Chrome users stay safe from malware and phishing websites. [Read More]
FireEye announces new solutions, capabilities, pricing and packaging models, and a partnership with Oracle [Read More]
Thirty-four major tech and security companies have aligned themselves and signed the Cybersecurity Tech Accord, what they claim is a "watershed agreement among the largest-ever group of companies agreeing to defend all customers everywhere from malicious attacks. [Read More]
Cisco patches critical remote code execution vulnerability in WebEx and a critical information disclosure flaw in UCS Director [Read More]

SecurityWeek Experts

rss icon

Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.
Alastair Paterson's picture
While less powerful than desktops and servers used for this purpose, more Android devices exist, and they are often less protected and, thus, more easily accessible.
Joshua Goldfarb's picture
Those of us that spend our lives in security sometimes forget how our field looks and sounds to others.
Ashley Arbuckle's picture
Visibility, segmentation, and threat defense are foundational elements to any security strategy allowing you to reduce risk while creating new opportunities to deliver value to your customers, partners, and the organization.
Scott Simkin's picture
Clunky security approaches, pieced together from multiple vendors, result in a fragmented security environment where IT teams must manually correlate data to implement actionable security protections.
Marc Solomon's picture
It isn’t sufficient for security teams to prevent, detect and respond to attacks. Security teams also must be able to proactively investigate and understand what the latest, large-scale cyber campaign means to their organization.
Preston Hogue's picture
While security-as-a-service for functions like WAF and DDoS protection are well-established, they are just the beginning of a new industry that is emerging around consumption-based security models.
Justin Fier's picture
When we look at this cycle of stealthy and silent data breaches, we have to ask ourselves: how can such tremendous amounts of data leave our corporate networks without raising any alarms?
Markus Jakobsson's picture
Men and women may jokingly refer to their significant other as their “partner in crime,” but when it comes to romance scams, this joke may become a sad reality.
Joshua Goldfarb's picture
Directness is something that some cultures do better than others. So how can we as security practitioners identify areas in which directness can help us improve?