Security Experts:

More Security Headlines

FireEye detected a highly targeted attack exploiting two zero-day vulnerabilities in an effort to compromise an “international government entity” in an industry vertical that aligns with known targets hit by a threat actor group which FireEye calls APT28.
Google's Gerhard Eschelbeck holds the reins of security and privacy for all-things Google. In an exclusive interview with, Eschelbeck spoke of using Google's massive scope to protect users from cyber villains such as spammers and state-sponsored spies.
Two teenagers are suspected of having hacked the websites of Belgian and French newspapers earlier in the week, prosecutors said Friday.
The security industry comments on the latest Verizon Data Breach Investigations Report (DBIR).
Mojang patches vulnerability that could have been exploited to crash Minecraft servers. The security bug was reported to the company nearly 2 years ago.
Invincea has enhanced its offerings with new threat identification and response capabilities added to its container-based endpoint protection solution.
Critical vulnerability exploited by Microsoft earlier this week has been exploited in the wild to crash affected systems.
WikiLeaks published thousands of documents on Thursday from last year's Sony hacking scandal, calling them an insight into the inner workings of a "secretive" firm.
PCI DSS v3.1 is now out, and businesses have until the end of June 2016 to comply with the new rules regarding SSL and migrate off the protocol.
Iran poses a growing threat to America's computer networks and has launched increasingly sophisticated digital attacks and spying on US targets, according to a new report released Thursday.

SecurityWeek Experts

rss icon

Danelle Au's picture
As long as companies continue to pay ransoms when attacked, we should expect cyber extortion to continue in 2015.
David Holmes's picture
Will containers replace traditional operating system virtualization in the same way that virtualization has replaced much of the physical, bare-metal world? And how secure are containers, anyway?
Joshua Goldfarb's picture
Tree rings occur when the growing season ends and growth stops. To avoid stagnation, a security organization must never stop growing.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Pat Calhoun's picture
While individual products and technologies are important weapons, they operate in a silo and lose sight of the bigger picture. The reality is that you can’t just rely on a single defense or a silver bullet.
Torsten George's picture
These four cyber security building blocks can help organizations can fulfill their requirements for quantitative risk reporting and neutralize the impact of cyber-attacks.
Rafal Los's picture
Enterprises that don’t operationalize configuration and asset management are doomed to repeat the cycle of lost productivity, frustration and panic.
Jason Polancich's picture
We seem to be at a watershed moment in both the cybersecurity market and with our business cyber defense circumstances.
Marc Solomon's picture
Just as they’ve embraced other technology innovations to advance their businesses, midsized organizations need a new approach to cybersecurity that mitigates risk to valuable digital assets.
Travis Greene's picture
Just like fumbles and interceptions derail a playbook plan, there are two ways that access certifications today are insufficient.