Security Experts:

More Security Headlines

China's first "cyber court" was launched Aug. 18 to settle online disputes, as the legal system attempts to keep up with the explosion of mobile payment and e-commerce. [Read More]
A ransomware called SyncCrypt hides its components inside online harmless-looking images that don’t trigger anti-virus detection. [Read More]
Philips and ICS-CERT warn healthcare providers of potentially serious vulnerabilities in a radiation exposure tool [Read More]
ZDI discloses unpatched remote code execution vulnerabilities affecting Foxit Reader [Read More]
Facebook awards Internet Defense Prize of $100,000 to researchers who described a novel method for detecting spear-phishing in enterprises [Read More]
The public availability of new exploit packages fueled millions of new attacks on popular applications during the second quarter of 2017, according to Kaspersky Lab. [Read More]
Flashpoint has launched the Flashpoint Intelligence Academy (FIA to help organizations understand how to structure an action program that embraces the full combined intelligence of BRI. [Read More]
Major companies report losing hundreds of millions of dollars due to the recent NotPetya malware outbreak [Read More]
The U.S. Army Network Enterprise Technology Command (NETCOM) will deploy Plurilock’s BioTracker continuous authentication cybersecurity software to protect warfighters against identity compromise. [Read More]
The Locky ransomware family that dominated the charts last year has returned, and has been distributed through high volume campaigns over the past week. [Read More]

SecurityWeek Experts

rss icon

Adam Meyer's picture
When thinking about threat intelligence, before you buy a data feed, platform, service, etc. you should have a defined process in place that supports a defined strategy.
Alastair Paterson's picture
The emergence of decentralized marketplaces within the criminal ecosystem poses significant challenges for law enforcement agencies and private security vendors.
Jennifer Blatnik's picture
One of the crucial benefits of blockchain is its distributed capabilities, which mean there isn’t one centralized target to hack.
Preston Hogue's picture
Business leaders have become much more sophisticated in understanding IT, and they need bring that same level of sophistication to security.
Travis Greene's picture
Automation will play an ever-increasing role in IT security. Like all automation, it will result in greater productivity that will reduce the need for certain staff, but increase the need for others.
Galina Antova's picture
In the ICS world, we clearly don’t have a decade to evolve through the same layered/defense-in-depth strategies that marked the last decade in IT security.
Erin O’Malley's picture
Can you see into all data across your network? Or does some data remain hidden due to silos between network and security operations teams?
Ashley Arbuckle's picture
As with most new and challenging endeavors, you need to define a pragmatic approach to mastering hyper-connectivity, data integration, and machine learning.
Marc Solomon's picture
Automatically recalculating and reevaluating priorities and threat assessments ensures you continue to stay focused on what is relevant to mitigate your organization’s risk.
Steven Grossman's picture
Organizations are increasingly combining UEBA technology with other data sources and analytics methods to overcome cyber risk challenges on a broader scale.