Security Experts:

More Security Headlines

Google is displeased that Symantec failed to oversee issuance of certificates by its partners and wants Chrome to gradually distrust all current certificates [Read More]
The server hosting Android Forums was hacked and the website’s database was accessed. Only 2.5% of active users affected [Read More]
Apple’s initial analysis shows that the iPhone and Mac exploits disclosed by WikiLeaks have already been patched, and the company told WikiLeaks to submit vulnerabilities through the normal process [Read More]
WikiLeaks releases documents describing Apple device hacking tools used by the CIA. Most require physical access to the targeted device [Read More]
Mocana's IoT Security Platform is a comprehensive full-stack security solution designed to protect industrial IoT devices, industrial clouds and device-to-cloud communications. [Read More]
Over the last year, Google has improved the discovery and responsible disclosure of vulnerabilities in its partners' products; and improved on the speed and regularity of device patching. [Read More]
A remote code execution (RCE) vulnerability in SAP GUI exposes unpatched systems to malware attacks such as ransomware, ERPScan security researchers warn. [Read More]
Cisco patches critical remote code execution vulnerability found by the company in its industrial routers [Read More]
Cybercriminals have been using a macro-enabled Word document that can be used to infect both macOS and Windows machines with malware. [Read More]
US federal prosecutors suspect the North Korean government directed last year's theft of $81 million from Bangladesh's account at the New York Federal Reserve Bank, according to a media report Wednesday. [Read More]

SecurityWeek Experts

rss icon

Josh Lefkowitz's picture
Without automation, analysts spend more time digging and less time interpreting information as only humans can do, to produce true intelligence.
Scott Simkin's picture
While there were many amazing startups with great ideas at RSA this year, I fear they will struggle to convince new customers that “yet another dashboard” or source of threat analytics or intelligence is going to improve their cybersecurity posture.
Adam Meyer's picture
While malicious actors demanding ransoms is not new, the surge of organizations being targeted with fake extortion demands and empty threats is. Let’s look at how extortion campaigns are carried out through the “avenue of approach” lens.
Alastair Paterson's picture
It’s natural to think that their adversaries are all financially motivated, but many are not. In 2016 we saw drivers like hacktivism, ideological differences and intelligence gathering also motivating attacks.
Joshua Goldfarb's picture
Risk, reporting, and metrics are three important topics within information security, and they all mean drastically different things to different audiences.
David Holmes's picture
Ladies and Gentlemen! Gamers and Cryptoheads! Have you ever wondered which major gaming console has the best message encryption? Well, I’m going to reveal the clear winner in my own recent personal test.
Steven Grossman's picture
When it comes to security and cyber risk, CISOs are in the middle of it all, but they are not alone in protecting the enterprise.
Marc Solomon's picture
There are strategies you can use so that the risk score is more relevant and useful within your specific environment.
Ashley Arbuckle's picture
Generally referred to as the “attack chain,” the approach cybercriminals follow to launch and execute attacks is well-documented and includes reconnaissance, weaponization, delivery, and installation.
Torsten George's picture
Let’s consider whether the proposed principles and tools by the World Economic Forum (WEF) can improve cyber resilience, and which types of enterprises can benefit most from implementing them.