Security Experts:

More Security Headlines

A cyber espionage group tracked as Orangeworm has been targeting healthcare organizations in the U.S., Europe and Asia, but it does not appear to be a state-sponsored operation [Read More]
A Windows 10 vulnerability that could bypass Windows Lockdown Policy and result in arbitrary code execution remains unpatched 90 days after Microsoft has been informed on the bug’s existence. [Read More]
Twitter no longer allows Kaspersky Lab to place advertisements on its platform, apparently over the security firm’s alleged ties to Russian intelligence [Read More]
A surge in new, anonymous Twitter accounts across swathes of Southeast and East Asia has deepened fears the region is in the throes of US-style mass social media manipulation. [Read More]
Microsoft unveils Windows Defender System Guard runtime attestation, a new Windows platform security technology for all editions of Windows [Read More]
British teenager who accessed the email accounts of top US intelligence and security officials including the head of the CIA was sentenced to two years in prison [Read More]
Researchers claim hackers can remotely exploit an unpatched command injection vulnerability to take control of LG NAS devices [Read More]
FDA reveals its plans for medical device cybersecurity, including requiring update and patch capabilities built into devices, updated guidance for protecting against risks, and policies and procedures for vulnerability disclosures [Read More]
AlienVault launches OTX Endpoint Threat Hunter, a free scanning service that allows organizations to identify threats and assess risk [Read More]
LinkedIn patches AutoFill vulnerability that could have been exploited to harvest data from users’ profiles [Read More]

SecurityWeek Experts

rss icon

Steven Grossman's picture
Without an understanding of where you stand today, new security tools will result in more redundancy and gaps in protection.
Marc Solomon's picture
The industry needs to share a common understanding of how to put threat intelligence into practice to address some of our thorniest security operations challenges.
Ashley Arbuckle's picture
Edna Conway, Cisco’s Chief Security Officer, Global Value Chain, discusses mitigating third-party security risk across an ecosystem that includes tens of thousands of partners located around the globe.
Torsten George's picture
Implementing machine learning in the context of access control can help organizations reduce their reliance on passwords, and potentially get rid of them altogether.
Stan Engelbrecht's picture
Which unlucky industry will be the latest target caught in the crosshairs of cyber attackers? Unfortunately, there are several reasons that suggest mass transit will be the next casualty, and the potential for damage is quite serious.
Jim Ivers's picture
More vulnerabilities create more attacks; more attacks breed additional fatigue. So how can we wake up and fix the problems creating such a widespread headache?
Lance Cottrell's picture
Discussions around hacking back in Congress today rely on analogies that are too simple and use examples focused on physical self-defense that fail to capture the true nature of online interactions.
Barak Perelman's picture
The breadth of attacks targeting critical infrastructure sectors are not only deeper but also broader than originally thought. Most likely, Russia and others want to acquire a “Red Button” capability that can be used to shut down the power grid.
Josh Lefkowitz's picture
Decision advantage reinforces that the value of intelligence lies not in the intelligence itself but in the decisions it shapes and drives.
Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.