Security Experts:

More Security Headlines

Ireland's High Court on Friday rejected Facebook's bid to block an investigation that could potentially stop data transfers from the European Union to the United States. [Read More]
The agency encourages critical infrastructure entities and governmental organizations to review and apply the guidance. [Read More]
Nearly a dozen cybersecurity-related mergers and acquisitions were announced May 10-16, 2021. [Read More]
Russian Alexander Vinnik, jailed last year for money laundering, begins an appeal at a Paris court Tuesday, as prosecutors challenge his acquittal on charges that he masterminded massive ransomware attacks. [Read More]
Israeli cybersecurity startup Authomize, which has developed an automated, cloud-based authorization governance and management Solution, emerged from stealth mode with $6 million in seed funding. [Read More]
The criminal gang behind the disruptive Colonial Pipeline ransomware hack says it is shutting down operations, but threat hunters believe the group will reemerge with a new name and new ransomware variants. [Read More]
NetSPI, a provider of enterprise penetration tools and services, has raised $90 million in growth funding led by private equity giant KKR, with participation from Ten Eleven Ventures. [Read More]
Impacted vendors have released security advisories in response to the FragAttacks Wi-Fi vulnerabilities. [Read More]
The company provides enterprises with the necessary tools to streamline app security and improve developer productivity. [Read More]
Initially disclosed in November 2020, the high severity vulnerability could be abused by authenticated, local attackers. [Read More]

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
Josh Goldfarb analyzes five statements stubborn people often say, discusses how they harm an organization's security posture, and suggests ways forward in each case.
Marc Solomon's picture
For efficiency and effectiveness, automation must take a data-driven approach and encompass how we initiate and learn from the response, not just how we execute the process.
Tim Bandos's picture
Shifting to the cloud can be a radical but necessary change. There’s no denying the transition can be time consuming and costly upfront.
Gordon Lawson's picture
While obscurity is an offensive tool for attackers, it also represents a defensive measure for organizations. Let’s consider the benefits of concealing network infrastructure and activity from the outside world to reduce the enterprise attack surface.
Landon Winkelvoss's picture
In response to a specific attack, it’s important to do external threat monitoring and threat actor engagement to determine if the actors are attempting to exploit or monetize the security event.
William Lin's picture
The combination of “shifting left” and “cloud security” is going to happen and be called “shifting everywhere.”
Rob Fry's picture
Each year we see more vendors with technology solutions and buzzwords that rarely live up to their hype and customers willing to believe or gamble for the chance at more visibility, lower business risk, or the chance to close a security gap.
Idan Aharoni's picture
Fraudsters will determine who to target within the industry based on each service’s fraud prevention policies and maturity, rather than generally targeting the industry.
John Maddison's picture
The best defense in depth strategy is one that enables multiple tools, deployed across the distributed network—including endpoints, clouds, and applications—to work as a unified solution to detect and respond to threats.
Torsten George's picture
Despite the long-standing belief that deploying more security solutions will result in greater protection against threats, the truth of the matter can be very different.