Security Experts:

More Security Headlines

Researcher finds way to bypass XSS filter in SAP-owned company’s product. 100 websites affected. [Read More]
US Defense Secretary Ashton Carter and his South Korean counterpart discussed their concerns over a growing list of threats from North Korea, including nuclear tests and computer hacking. [Read More]
TalkTalk has shared information on the number of customers impacted by the recent data breach. Third suspect arrested by UK police. [Read More]
A hacker who defaced the official vBulletin forum claims to have stolen user data. vBulletin website and forum taken offline. [Read More]
The German bank Sparkasse has started updating its ATMs to patch vulnerabilities that can be exploited for information disclosure and device manipulation. [Read More]
Hacker group Anonymous is planning to reveal the identities of up to 1,000 Ku Klux Klan members, the latest twist in an ongoing cyber-war on the white supremacist group. [Read More]
The group behind CryptoWall 3.0 made more than $300 million, according to a new report from the Cyber Threat Alliance. [Read More]
Industry professionals comment on CISA's approval by Senate and its impact on cyber security and privacy. [Read More]
A 16-year-old boy is the second suspect in the TalkTalk hack case. He was arrested on Thursday by the Metropolitan Police. [Read More]
Google has awarded a researcher $3,133.7 for finding an XSS vulnerability in YouTube Gaming. [Read More]

SecurityWeek Experts

rss icon

John Maddison's picture
Physical and virtual security appliances traditionally suffer from performance challenges, especially when it comes to critical functions such as inspecting encrypted traffic.
Torsten George's picture
Most of today’s cyber-attacks are front ended by phishing campaigns. So, what can organizations do to prevent their users from falling for the bait of these attacks?
Galina Antova's picture
We are at a stage where adversaries regularly operate below the threshold of armed conflict, using their powerful warcraft for economic and political advantage while maintaining plausible deniability.
Josh Lefkowitz's picture
As the technology and tools to leverage stolen credentials advance, defenders should seek out innovative new ways to proactively flag exposed passwords leveraging insights gleaned from illicit communities and open-web dumps.
Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Joshua Goldfarb's picture
Gap analysis can serve as a wonderful driver for improving security metrics if the security team understands how to seize the opportunity it presents.
Gunter Ollmann's picture
While defense scoring lowers the barrier to sharing defensive success insights, it does not yet address the insights gained from learning from others’ failures and the stigma of a breach.
AJ Nash's picture
Elevating from the Cyber threat intelligence (CTI) team concept to an “intelligence team” concept is the next generation of intelligence practice within the private sector.
Marc Solomon's picture
Threat intelligence value comes down to relevance and accessibility, which requires curation into a customized enrichment source, aggregating data filtered by a range of factors.
Craig Harber's picture
No matter how many best-of-breed protective solutions you use to defend your network, the unfortunate reality is eventually an attacker is going to get past them.