Security Experts:

More Security Headlines

The Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) announced this week that it would merge with Webster University's Cyberspace Research Institute (CRI).
Firefox 39 patches two dozen vulnerabilities, including 13 critical issues and the Logjam crypto bug.
Kovter ad fraud trojan updates Flash Player and Internet Explorer on infected systems to keep other malware out.
Mobile malware steals messages from a sandboxed communications app by abusing an Android accessibility feature.
German Chancellor Angela Merkel's office asked the US ambassador to come in to discuss new allegations of NSA spying, which threaten to drive a new wedge through transatlantic ties.
Cisco Unified Communications Domain Manager platform software is plagued by a vulnerability that allows a remote attacker to gain root privileges on the system.
A hacker claims to have stolen customer data and software from Plex. He threatens to leak the information if he is not paid 9.5 Bitcoins.
Harvard University has been hacked. A security firm reported seeing spam emails carrying Dyre malware coming from Harvard’s systems.
The PCI Council has announced updates to the Point-to-Point Encryption (P2PE) and device security standards.
Donald Trump’s hotels may have been targeted by cybercriminals. Possible credit card breach investigated.

SecurityWeek Experts

rss icon

Adam Ely's picture
The increase in mobile security conversations shows that teams are still trying to figure out their strategy and how to address this new landscape of vulnerabilities.
Rafal Los's picture
Often times it’s the insiders that enable the external attacker – either willingly or otherwise, and the result can be even more devastating than that of an external attacker.
Travis Greene's picture
Can IT security find a way to coexist with wearables faster than the first BYOD war and avoid a second war?
Mark Hatton's picture
Unfortunately, when it comes to security, what you’ve accomplished means very little. It’s all about where the vulnerabilities still exist.
Scott Simkin's picture
In the moments after a breach, security teams will often focus on the event itself, but not draw additional insight from the attack, or analyze the events surrounding it.
Jason Polancich's picture
With your own internal cyber bounty program designed to reward your best assets at their positions, you can begin to see real results against attackers and build a team that will compete over the long haul.
Marc Solomon's picture
Cybercrime-as-a-Service is increasing the sophistication and frequency of attacks to the point where they seem to be pervasive. When evaluating your approach to security in light of this increasingly popular approach to attacks, seek out solutions that are equally pervasive.
Joshua Goldfarb's picture
When moving to the cloud, companies must understand the implications, enumerate the risks, and mitigate those risks accordingly.
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
Wade Williamson's picture
In light of the seemingly endless parade of high-profile breaches, it’s easy to focus on external threats, while losing sight of insider threats.