Security Experts:

More Security Headlines

According to new research from Incapsula, 34.3 percent of all the fake Googlebots identified were overtly malicious, with 23.5 percent of these being used for Layer 7 DDoS attacks.
The White House chief of staff and his German counterpart met Tuesday amid a serious rift over allegations of US spying.
A large number of websites have been compromised by cybercriminals who are exploiting a recently patched security hole the popular MailPoet newsletter plugin for WordPress.
The cyber-crime crew was able to take over some 1,600 StubHub user accounts as part of their scheme, authorities said.
Bugcrowd, the crowdsourced security company that specializes in bug bounty programs, has released a guide to help organizations set up responsible disclosure programs.
The attack used the Nuclear exploit kit, which is known for targeting vulnerabilities in Microsoft Internet Explorer and Oracle Java SE.
Information security specialists at the Georgia Tech Research Institute have developed BlackForest, a new open source intelligence gathering system.
The United States has failed to sufficiently adapt to new cyber-security threats, exposing itself to potential terror strikes as devastating as September 11, authors of the report on the 2001 attacks warned.
Comodo SecureBox is designed to help organizations protect the important applications running on their endpoints.
StubHub confirmed today it had been hit by cyber-attackers in a global operation

SecurityWeek Experts

rss icon

Jon-Louis Heimerl's picture
Cybercrime “case studies” are always impersonal, right? Would you get more out of specific stories of individuals caught in the cross hairs instead of corporate entities?
Pat Calhoun's picture
The need for extreme network protection may be the driving force behind your decision to invest in a next-generation firewall (NGFW), but your enterprise also has other factors to consider.
Torsten George's picture
When an organization is solely focused on strengthening its compliance posture to pass an audit, they primarily look at control failures and gaps and try to mitigate them.
Mark Hatton's picture
You need to identify your security shortcomings before someone else does. Simulate attacks and tests to associate known vulnerabilities, previous attack patterns, and security/network data to identify potential attack paths to your company’s most important data.
Marc Solomon's picture
To help cybersecurity professionals cut through the hype and gain a better understanding of what to expect as the Internet of Everything continues to evolve, these top 10 observations might help.
Adam Ely's picture
Yesterday’s device management approach does not work in a BYOD world. The end users are bringing their own devices, so we need to adjust to accommodate this new world order.
Joshua Goldfarb's picture
An organization that keeps records of its security incidents should be able to study that data to understand the top ways in which it is generally becoming compromised.
Jason Polancich's picture
In order to make our ecosystem a safer place for all of us, small and large, the big guys out there are going to have to start - at least in part - handling the security of their small business partners, suppliers and customers.
Rebecca Lawson's picture
As enterprises made trade-offs in security; either sacrifice performance in order to add more layers of security beyond the traditional stateful firewall or don’t implement the new protections necessary to protect against many of the latest threats.
Danelle Au's picture
As the era of Internet of Things dawns, the amount of data and other cloud applications developed for unique industries will increase and bring a new era of privacy and security concerns.