Security Experts:

More Security Headlines

Vulnerabilities found by researchers in the Segway miniPRO allow hackers to take control of the hoverboard and possibly cause injury to the rider [Read More]
CrowdStrike and Dragos form strategic partnership to provide comprehensive ICS / SCADA security services. [Read More]
The DarkHotel APT, known mostly for targeting business travelers, spotted attacking political figures via new methods [Read More]
Google is taking another step to better protect users from malicious third-party web applications by warning users of newly created web apps and Apps Scripts that are pending verification. [Read More]
The official Call for Papers (speakers) for SecurityWeek’s 2017 Industrial Control Systems (ICS) Cyber Security Conference, being held October 23 – 26, 2017 at the InterContinental Buckhead Atlanta, Georgia, USA is open through August 15, 2017. [Read More]
A security audit of Firefox Accounts revealed a total of 15 issues, including flaws rated critical and high severity [Read More]
Oracle on Tuesday released its July 2017 Critical Patch Update (CPU) to address a total of 308 vulnerabilities, the highest number of security fixes ever released in a quarter. [Read More]
A vulnerability dubbed by researchers Devil’s Ivy could affect millions of security cameras and other IoT devices [Read More]
Rapid7 announced that it has acquired security orchestration and automation firm Komand for an undisclosed sum. [Read More]
Britain's GCHQ has warned that state-sponsored hackers are targeting Industrial Control System (ICS) engineering and services organizations, which have likely have been compromised. [Read More]

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
Will your security team always see the security program like elementary school children see the water fountain -- just right or on the path to being just right?
Michael Adler's picture
With summer fully upon us, we in the security profession need to make sure the change in season doesn’t create additional vulnerabilities.
Justin Fier's picture
Every company and organizations is vulnerable to cyber-attacks, and investing in security innovations and gaining total network visibility are more important than ever.
Erin O’Malley's picture
Finding patterns and uncovering clues within network noise requires both broad and granular visibility into traffic (plain-text and encrypted) and is essential for defense against advanced threats.
Oliver Rochford's picture
The lifting of certain sanctions may provide an alternative incentive to limit certain types of cyberwar activity.
Josh Lefkowitz's picture
While President Trump’s executive order has laid an impressive and hopeful foundation for a more secure nation, its focus on bolstering federal defenses against large-scale cyber attacks and nation-state cyber threats is still too narrow.
Adam Meyer's picture
Tactical cyber threat intelligence can provide you with specifics around the technical aspects of an attack and help you identify areas within your environment to shore up.
Alastair Paterson's picture
There’s a great deal of intelligence organizations can find on the deep and dark web, but it's important to remember that criminal activity isn’t limited to the dark web.
Dan Cornell's picture
Being able to properly defend applications requires organizations to first identify their attack surfaces before meaningful risk management can take place.
Scott Simkin's picture
Users, networks and applications can – and should— exist everywhere, which puts new burdens on security teams to protect them in the same way as the traditional perimeter.