Security Experts:

More Security Headlines

Amateurish cybercriminal from Nigeria triggered Rombertik's MBR overwrite mechanism, says ThreatConnect.
Hackers pose a real danger to self-driving vehicles, US experts are warning, and carmakers and insurers are starting to factor in the risk.
The US Senate failed Sunday to reach a deal that would prevent key counterterror provisions from expiring at midnight, after Senator Rand Paul blocked the chamber from advancing a solution.
CIA chief John Brennan warned Sunday that allowing vital surveillance programs to expire could increase terror threats, as the US Senate convened for a crunch debate on whether to renew the controversial provisions.
Key parts of the USA Patriot Act which underpins domestic NSA surveillance measures, including the bulk data dragnet, will "sunset" at the end of May 31 without action by lawmakers.
The US mastermind behind criminal website Silk Road, which sold $200 million worth of drugs to customers worldwide, was sentenced to life in prison by a federal judge in New York Friday.
At midnight Sunday, barring any last-minute deal in Congress, a key section of the US Patriot Act which has been used as a legal basis for much of the vast surveillance carried out by the NSA will expire or "sunset."
The security industry's reactions to the BIS proposal on the addition of cyber weapons to the Wassenaar Arrangement.
The number of Botnet-powered DDoS attacks decreased in the first quarter of 2015, according to Kaspersky Lab.
Belgium has launched an investigation into claims of widespread espionage by Germany, which is accused of helping the US spy on Berlin's closest allies in Europe, a minister said Friday.

SecurityWeek Experts

rss icon

Nate Kube's picture
Manufacturing supply chains are vital to the development and fulfillment of any modern technology—they change rapidly and locations of suppliers change. This dynamic nature of the supply chain exposes enterprises to a wide variety of risks.
Wade Williamson's picture
While higher education certainly has some unique challenges, they are by no means alone in terms of facing breaches. Attackers who want to get into a network can typically afford to be patient.
Joshua Goldfarb's picture
Life is full of distractions, and the information security profession is not immune to them. Security professionals have an obligation to remain focused on building, maturing, and improving our security programs and security postures.
Torsten George's picture
How can companies deal with this challenge and transition to a model that uses more data to assess risks? One way is to implement cyber security operational risk management best practices.
Rafal Los's picture
Security leaders struggle to replicate successes from one enterprise to another largely because they are starting from scratch at every new turn.
Jason Polancich's picture
Cyber defense must develop from a solid foundation in verifiable data into repeatable, measurable processes that mitigate or eliminate risk. With simple risk intelligence, any business can go from nothing to something much faster.
Marc Solomon's picture
By embedding security everywhere across the extended network, not only does security become more effective against advanced attacks, it also becomes a business enabler.
Travis Greene's picture
Security teams must bear equal, if not more responsibility, for reducing the risk of credential fatigue leading to inadvertent exposure.
Mark Hatton's picture
In the world of security, there is often a significant difference between perceived reality and what is actually happening, and the public’s perception of security within your organization can be just as important as reality.
Adam Ely's picture
The mobile strategist will play a pivotal role in mobile integration, as they pave the way for the organizations to do so purposefully and securely.