Security Experts:

More Security Headlines

The Tor anonymity network might be disrupted in the next few days via the seizure of directory authorities, the Tor Project has learned
South Korea's nuclear power plant operator launched a two-day drill to test its ability to thwart a cyber attack, after a series of online information leaks by a suspected hacker.
Vulnerabilities in the Network Time Protocol (NTP) could enable an attacker to take control of a system.
Attackers who recently breached some ICANN systems did not obtain access to the IANA functions systems, the organization said.
North Korea's alleged hack of Sony Pictures was not an act of war, President Barack Obama said in an interview that appeared aimed at keeping a lid on simmering tensions with Pyongyang.
The United States has asked China to help block cyber attacks from North Korea as it weighs a response to the crippling hack of Sony Pictures, a US official said.
North Korea called Saturday for a joint investigation with the US into a crippling cyber attack on Sony Pictures, denouncing Washington's "slandering" after President Barack Obama warned Pyongyang of retaliation.
Barack Obama warned North Korea it would face retaliation for a crippling cyber attack on Sony Pictures over an irreverent film comedy that infuriated Pyongyang.
US-CERT provided a list of the Indicators of Compromise (IOCs) that should be added to network security solutions to determine whether they are present on a network.
A new banking Trojan that appears to be an evolved version of the notorious Zeus has been analyzed by researchers at Kaspersky Lab.

SecurityWeek Experts

rss icon

Torsten George's picture
2015 will prove to be a challenging year for IT security professionals. So, what can we expect in the next 12 months?
Jon-Louis Heimerl's picture
Based on high level review of the types of breaches we have seen over the past year, we should be able to see opportunities to make our environments more resilient to attack.
James McFarlin's picture
If North Korea is connected to the Sony attacks, it would be an archetypal example of such a weaker state using cyber operations to level the playing field in potential confrontations with the United States.
Rebecca Lawson's picture
Moving towards an adaptive and automated way of applying intelligence based on behavior and heuristics is clearly moving in the right direction to enable a more actionable and relevant set of controls.
David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.
David Maman's picture
Through simple planning and forethought, organizations can ensure their databases not only meet compliance requirements, but will remain secure.
Adam Firestone's picture
Security requirements for information assurance, risk management, and certification and accreditation constrain Government organizations with respect to software allowed on Government networks.
Joshua Goldfarb's picture
In resource-limited environments, every alert counts. Spear alerting is an approach that can help organizations improve their signal-to-noise ratio and make their security programs much more efficient and effective.
Jason Polancich's picture
Starting your own private ISAC is easier and more important long-term than you might think.
Marc Solomon's picture
Today’s email-based attacks don’t occur at a single point in time and use multiple methods to evade detection. To bolster protection, organizations may turn to a set of disparate products that don’t – and can’t – work together.