Security Experts:

More Security Headlines

The U.S. Defence Information Systems Agency (DISA) has disclosed a 2019 data breach in which personal information may have been compromised. [Read More]
A surge in malicious login attempts is likely to be a flood of credential lists in the criminal marketplace, the attractiveness of financial data, and a more general shift in criminal credential abuse towards targeting API logins. [Read More]
An active supply chain campaign that has been ongoing since late 2017 has infected at least 20,000 websites — likely much more — via trojanized WordPress themes and plugins. [Read More]
Georgian authorities on Thursday accused Russia’s military intelligence of launching a large-scale cyberattack that targeted the government and private organizations with the goal of destabilizing the ex-Soviet nation. [Read More]
Cisco has released patches for sixteen vulnerabilities across its products, including one rated critical, six high severity, and nine medium risk. [Read More]
Over 400 ICS vulnerabilities were disclosed in 2019 and more than a quarter of them had no patches when their existence was made public, according to industrial cybersecurity firm Dragos. [Read More]
Microsoft this week announced the general availability of Microsoft Threat Protection, its integrated security solution aimed at offering protection across users, email, applications, and endpoints. [Read More]
Britain and the United States on Thursday accused Russian military intelligence of orchestrating a "reckless" campaign of cyber attacks against Georgia last year. [Read More]
Fidelis Cybersecurity has announced a raft of enhancements to its Fidelis Elevate platform, which comprises a network product, an endpoint product, and a deception product. [Read More]
Wandera has warned that document management apps made by Cometdocs can expose users’ files, but the vendor has disputed the severity of the findings and has threatened legal action against reporters. [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
When you’re at RSAC next week remember the “Human Element” is a great lens through which you can view and help assess the value of companies you partner with for security.
Laurence Pitt's picture
What can we do in order to prevent the spread of fake content or reduce the risk of a targeted use of Deepfakes that could cause damage to our organization?
Preston Hogue's picture
The ability to look deeply into user and system behavior and identify the smallest anomaly will become the essential toolkit to stem the tide of fraud and theft in financial services.
John Maddison's picture
Physical and virtual security appliances traditionally suffer from performance challenges, especially when it comes to critical functions such as inspecting encrypted traffic.
Torsten George's picture
Most of today’s cyber-attacks are front ended by phishing campaigns. So, what can organizations do to prevent their users from falling for the bait of these attacks?
Galina Antova's picture
We are at a stage where adversaries regularly operate below the threshold of armed conflict, using their powerful warcraft for economic and political advantage while maintaining plausible deniability.
Josh Lefkowitz's picture
As the technology and tools to leverage stolen credentials advance, defenders should seek out innovative new ways to proactively flag exposed passwords leveraging insights gleaned from illicit communities and open-web dumps.
Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Joshua Goldfarb's picture
Gap analysis can serve as a wonderful driver for improving security metrics if the security team understands how to seize the opportunity it presents.
Gunter Ollmann's picture
While defense scoring lowers the barrier to sharing defensive success insights, it does not yet address the insights gained from learning from others’ failures and the stigma of a breach.