Security Experts:

More Security Headlines

DHS and FBI warn of attacks by Russia-linked actor on government entities and organizations in the energy, nuclear, water, aviation, and critical manufacturing sectors [Read More]
Endgame used Mitre’s ATT&CK Matrix to evaluate its endpoint detection and response product by emulating an APT3 attack [Read More]
Google says roughly two-thirds of the websites loaded through Chrome use HTTPS by default [Read More]
Amazon-owned Whole Foods Market said the recent payment card breach impacted nearly 100 locations across the U.S. [Read More]
U.S. Federal Energy Regulatory Commission (FERC) proposes new cyber security management controls to enhance power grid reliability and resilience [Read More]
Contracting giant Booz Allen is to acquire cybersecurity firm Morphick, a move that will help Booz Allen to move further along its published plan to expand its commercial presence. [Read More]
Locky starts using new technique involving the DDE protocol to evade detection and improve infection rates [Read More]
Visa launches ID Intelligence, a new platform that allows card issuers, acquirers and merchants to adopt new biometric methods of their own preference [Read More]
Google prompt has now become the primary choice for 2-Step Verification (2SV), instead of SMS [Read More]
A new, massive Mirai-linked botnet is recruiting improperly secured IoT devices such as IP wireless cameras [Read More]

SecurityWeek Experts

rss icon

Josh Lefkowitz's picture
When key decision-makers broaden their mindsets and strategies pertaining to the value and function of intelligence, their organizations can become better positioned to mitigate the cyber and physical risks they face.
Scott Simkin's picture
There are fundamentals that have stood the test of time and can help prevent successful cyber breaches from occurring despite the pace at which the landscape shifts.
Adam Meyer's picture
Threat intelligence playbooks that support strategic and operational levels help teams be more effective, more certain in their actions and allow security programs to be agile/maintained as situations change.
Alastair Paterson's picture
The Equifax breach has had a damaging impact on the company and has put its customers at risk. But it has also served as a wake-up call for organizations around the globe.
Jennifer Blatnik's picture
By taking what you know about security in the physical world and logically applying it to the virtual world, you can effectively protect your personal information.
Rafal Los's picture
With the many strategy development workshops in which I’ve successfully engaged, it’s hard to believe how many companies struggle with stakeholders as a starting point.
Justin Fier's picture
When third-parties are integrated onto the network, threats are bound to slip through the cracks, and the Equifax hack demonstrated how easy it is for a subtle threat to develop into a debilitating data breach.
Travis Greene's picture
If awareness isn’t working to change the behavior of employees and consumers, is there anything that can be done?
Galina Antova's picture
Following these prescriptive steps can help do something about the state of security in your own ICS network environment.
Marie Hattar's picture
Moving applications and content out to the edge of the network in cellular base stations is making some CSOs at large enterprises nervous.