Security Experts:

More Security Headlines

Around 18,500,000 websites are infected with malware at a given time each week; while the average website is attacked 44 times every day. [Read More]
Siemens has patched vulnerabilities in some of its SIMATIC industrial controllers and mobile applications [Read More]
Slingshot, the cyber espionage campaign recently exposed by Kaspersky, is a US government operation targeting terrorists, according to a report [Read More]
US efforts to conduct offensive and defensive operations in cyberspace are falling short, General John Hyten, who leads US Strategic Command (STRATCOM), said. [Read More]
Chipmaker Advanced Micro Devices (AMD) on Tuesday said patches are coming to address several recently disclosed security vulnerabilities in its chips. [Read More]
Virsec, a cybersecurity company that protects applications from various attacks, has closed a $24 million Series B funding round led by tech investment firm BlueIO. [Read More]
Attackers can use online sandbox services to exfiltrate data from an isolated network, a security researcher has discovered. [Read More]
Hackers breached Expedia-owned travel website Orbitz and may have stolen as many as 880,000 payment cards [Read More]
Apple has added new protections to the WebKit framework to prevent possible abuse of the HTTP Strict Transport Security (HSTS) security standard to track users. [Read More]
XM Cyber is an Israeli firm founded in 2016 that offers red teaming with blue teaming to produce "purple teaming" at speed, continuously, and at scale. [Read More]

SecurityWeek Experts

rss icon

David Holmes's picture
On January 8, 2018, the Singapore government published Bill No. 2/2018, referred to as “the Cybersecurity Bill.”
Torsten George's picture
The Zero Trust Security model offers a very pragmatic blueprint for implementing identity and access management-based strategies to secure applications, devices, data, and infrastructure – both on-premise and in the cloud.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Siggi Stefnisson's picture
It remains to be seen whether more legitimate web operations will embrace the approach, but you can count on illegitimate and malicious use of cryptomining to grow robustly.
Alastair Paterson's picture
Security teams need visibility outside the organization and across the widest range of data sources possible to mitigate digital risk and better protect the organization.
Jim Ivers's picture
Applications contain three specific components where vulnerabilities can be found, and each must be tested in a different way for security testing to be complete.
Marc Solomon's picture
How do you get the most value from your threat intelligence? It comes down to relevance, and that’s determined by your industry/geography, your environment and your skills/capabilities.
John Maddison's picture
Digital transformation and the accelerated evolution of cybercrime are the biggest challenges that IT security teams have ever had to face.
Erin O’Malley's picture
Designed for specific purposes, security tools should be fed only the data they need to do what they do best; they shouldn’t be burdened with irrelevant data.
Steven Grossman's picture
Identifying those kinds of repeated non-malicious behaviors amongst a group of peers can help identify broken business processes that are requiring employees to violate policy in order to do their job.