Security Experts:

More Security Headlines

The U.S. Chamber of Commerce, along with more than 40 companies, have signed up to a set of new guiding principles for fair and accurate security ratings. [Read More]
A wave of "computational propaganda," largely driven by Russia, is impacting politics around the world by spreading misinformation designed to manipulate public opinion, researchers said Tuesday. [Read More]
Honda said June 21 that it had temporarily halted production at a plant in Japan after it suffered a cyberattack from the same ransomware that struck hundreds of thousands of computers worldwide last month. [Read More]
Drupal developers release security updates that patch several flaws, including one exploited in the wild in spam campaigns [Read More]
Hackers sponsored by the Russian government targeted election-related networks in 21 U.S. states, says the DHS [Read More]
SecurityWeek’s CISO Forum was specifically designed to bring together senior level security executives in an intimate environment for the ultimate exchange of knowledge and insights [Read More]
Not everyone believes it is possible to accurately define and compare costs of data breaches in different companies over time. In recent years both Verizon and ENISA have said it is too difficult. [Read More]
After making it available on iOS devices in November 2016, Mozilla this week brought its privacy-focused mobile browser to Android. [Read More]
Elastic Beam emerges from stealth mode with AI-powered API security solution [Read More]
Boston, MA-based Cybereason today announced a $100 million Series D investment from SoftBank Corp., bringing the total raised by the firm to $189 million since its inception in 2012. [Read More]

SecurityWeek Experts

rss icon

David Holmes's picture
An organization with a mature security process should be doing threat modeling on web applications and Internet of Things devices in the enterprise.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Torsten George's picture
The healthcare industry has experienced an onslaught of cyber-attacks over the last year, primarily driven by the fact that patient records are highly prized assets among cyber criminals.
Rafal Los's picture
Don’t overlook the importance of having something that’s repeatable. To be repeatable, a process must be well-documented, well-understood and well-practiced.
Ting-Fang Yen's picture
With the commoditization of cloud computing in recent years, fraudsters and cybercriminals alike have started to take advantage of public cloud services and dedicated/virtual hosting to conduct attacks.
Joshua Goldfarb's picture
How exactly does reviewing the different markets in the security space bring this famous quote from “Romeo and Juliet” to mind?
Jim Ivers's picture
Medical devices are indeed vulnerable to attack, but the industry is waking up to the breadth of the problems, and several organizations are forming a vanguard to show the way forward.
Oliver Rochford's picture
Einstein is often quoted as having said that insanity is doing the same thing again and again and expecting a different result. When it comes to cybersecurity, based on that definition, we must all be insane.
Michael Moniz's picture
To be an outstanding cybersecurity professional, you need to think outside of the box, be intellectually curious, self-sufficient and collaborative.
Josh Lefkowitz's picture
Organizations seeking to obtain actionable intelligence from the Deep & Dark Web (DDW) should recognize that doing so creates risk and requires substantial expertise, resources, and time.