Security Experts:

More Security Headlines

A new Terra Privacy product called Hacker Deterrent Pro uses dynamic whitelisting to block malware and phishing attacks [Read More]
Was North Korea behind the WannaCry ransomware epidemic that hit global computer networks earlier this month? [Read More]
Samba patches critical remote code execution vulnerability introduced in 2010. Over 100,000 Internet-exposed systems running vulnerable versions [Read More]
A newly observed Jaff variant continues to use Necurs and PDF files for infection, but moved away from the .jaff extension and the Locky-like ransom note. [Read More]
According to a survey, forty-seven percent of respondents "expect to be protected from cyber-attacks by either their company or third-party app developers." [Read More]
Samsung Electronics is investigating claims by a German hacking group that it fooled the iris recognition system of the new flagship Galaxy S8 device, the firm said. [Read More]
Former CIA director John Brennan said that he warned Russia last summer against meddling in the US presidential election but the Russians went ahead and did it, anyway. [Read More]
Retailer Target agrees to pay $18.5 million to 47 U.S. states as part of a settlement over the massive data breach suffered by the company in 2013 [Read More]
Vera's new Multi-Factor Authentication offering adds strong authentication to corporate data wherever it travels, and allows MFA to be limited to specified data. [Read More]
Qatar said Wednesday it had begun an inquiry into an unprecedented security breach by hackers who posted fake news stories attributed to its ruler on highly sensitive regional political issues. [Read More]

SecurityWeek Experts

rss icon

Justin Fier's picture
The early indicators of the WannaCry attack were evident, but it spread too quickly for human security teams to react before it spread across the world like wildfire.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Alastair Paterson's picture
With elections coming up in the UK in June and Germany in September what type of cyber interference might we expect? And, more importantly, what steps can we take to mitigate risk?
Galina Antova's picture
The security risk to Industrial Control Systems (ICS) networks is systemic and not determined by vulnerabilities alone.
Preston Hogue's picture
Defenders need a new type of counterinsurgent security that can move out into the jungle to protect users and sensitive data against attackers who disguise their exploits with the very encryption that we think keeps us safe.
Marie Hattar's picture
Understanding how well (or not) websites and networks deal with the unexpected spikes in inbound traffic is the first step in dealing with DDoS attacks.
Danelle Au's picture
When a vendor comes in for a presentation and, after only a few minutes, claims to know precisely what your challenges are and how to solve them, that’s a major red flag for the confident CISO.
Marc Solomon's picture
To harness the power embedded in disparate sources of threat data requires aggregating it and translating it into a uniform format for analysis and action.
Ashley Arbuckle's picture
In a globally interconnected world, knowledge-based economies are shaping our future, and vendor relationships are critical to success.
Travis Greene's picture
But choosing to become a black hat hacker is not without risk. If you’re a budding hacker, consider these downsides...