Security Experts:

More Security Headlines

Threat actors are abusing organizations’ reliance on communication services such as Discord and Slack to circumvent network protections and ensure effectiveness of attacks. [Read More]
Cisco patches a critical vulnerability in an SD-WAN software product but warned that a different high-risk bug in end-of-life small business routers will remain unpatched. [Read More]
NEWS ANALYSIS: Google’s decision to promote Rust for low-level Android programming is another sign that the shelf-life for memory corruption mitigations are no match for the speed of in-the-wild exploit development. [Read More]
A new study amplifies a major security concern for open source software supply chain -- managing the hodge-podge of libraries in commercial apps that contain vulnerabilities and are rarely updated. [Read More]
Belden shared an update on the data breach disclosed in November 2020 and said health-related information was also exposed. [Read More]
Cring ransomware operators exploit an old vulnerability in the FortiOS SSL VPN web portal to access enterprise networks, including the ones of industrial organisations. [Read More]
PHP developers have shared an update on the recent breach and while they no longer believe the Git server was compromised, it’s possible that a user database was leaked. [Read More]
Two researchers earned $200,000 on the second day of Pwn2Own 2021 for a Zoom exploit allowing remote code execution without user interaction. [Read More]
An unauthenticated update process vulnerability could be abused for the download and execution of malware on servers. [Read More]
Open source security management company WhiteSource has raised $75 million in Series D funding. [Read More]

SecurityWeek Experts

rss icon

AJ Nash's picture
Even if the best strategies and policies are created and uniformly agreed upon across all government and private sector domains, none of that will matter if the talent to execute does not exist.
Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.
Marc Solomon's picture
Collaboration with teams across the organization to utilize data more efficiently and effectively, dramatically improves detection and response and is critical to achieve enterprise-wide risk management.
Torsten George's picture
Understanding not just the tail end of the cyber-attack kill chain, but also focusing on initial attack vectors like endpoints provides a roadmap for aligning preventive measures with today’s threats.
Laurence Pitt's picture
Using Machine Learning (ML) with AI means that security tools can be trained to work better with data and the ML system will be able to make recommendations for improvements.
John Maddison's picture
In today’s highly dynamic environments, integration needs to go beyond just the security elements of a platform.
Tim Bandos's picture
While it’d be impossible to dig into all of the requests I’ve received over the years, here are some of the types of requests we’ve received that may make sense for you to ask your own managed security provider.
Idan Aharoni's picture
Taking down dark web sites may cause headache for both the bad guys and the good guys, but it can also have a profound positive effect on the fight against cybercrime.
Gunter Ollmann's picture
Once live stomping around vendor-packed expo halls at security conferences returns, it is highly probable that “Virtual Analyst” will play a starring role in buzzword bingo.
William Lin's picture
“What’s hot right now in security?” is one of the most common questions I hear from CISOs, vendors and VCs alike.