Security Experts:

More Security Headlines

A US judge on Sunday blocked the government's ban on WeChat downloads, hours before it was due to take effect in an ongoing technology and espionage battle between Washington and Beijing. [Read More]
The DHS has issued an Emergency Directive that requires federal agencies to address the Zerologon vulnerability, for which Microsoft released patches in August 2020. [Read More]
President Donald Trump said he’s given his “blessing” to a proposed deal between Oracle and Walmart for the U.S. operations of TikTok, the Chinese-owned app he’s targeted for national security and data privacy concerns. [Read More]
The private sector has become much more forthcoming about election interference since 2016, providing frequent briefings to key members of Congress. [Read More]
Mozi, a relatively new botnet, has fueled a significant increase in Internet of Things (IoT) botnet activity, IBM reported this week. [Read More]
An Iran linked group, named Rampant Kitten by researchers, has been discovered targeting anti-regime organizations in a campaign that has likely been running since 2014. [Read More]
The founder and CEO of NS8, a cyber fraud prevention and protection company, has been charged with fraud just months after the firm raised $123 million in funding. [Read More]
Patients and donors to at least four different health care providers in Minnesota are being notified that their personal information may have been compromised. [Read More]
Twitter is telling United States politicians, news outlets and journalists to take steps to ensure that their accounts are protected during the upcoming election. [Read More]
Chinese hackers have reportedly stolen information from Spanish laboratories working on a vaccine for Covid-19. [Read More]

SecurityWeek Experts

rss icon

Gunter Ollmann's picture
The phrase “assume breach” has been transformational to enterprise security investment and defensive strategy for a few years but may now be close to retirement.
Marc Solomon's picture
While it may be a trendy term, in cybersecurity, intelligence pivoting is pivotal to detection and response.
Joshua Goldfarb's picture
A healthy dose of self-doubt can go a long way towards keeping us on our toes and continually improving the security posture of our respective organizations.
Galina Antova's picture
As digital transformation and cybersecurity become pillars that successful companies will build their futures on, the time has come to include CISOs and CIOs on company boards.
Torsten George's picture
Vishing is a form of criminal phone fraud, combining one-on-one phone calls with custom phishing sites.
Idan Aharoni's picture
The term "Threat Intelligence" encompasses an ever-growing set of offerings that, on an operational standpoint, have different use cases.
Rafal Los's picture
If you're not allocating time to develop strong operational process - integrations and workflows - you're never going to solve the problem you're trying to solve.
Laurence Pitt's picture
Despite the lack of travel and in-person networking opportunities, virtual events have proven valuable in learning about the industry’s top trends and engaging in important discussions with our peers. Black Hat was no exception.
Justin Fier's picture
Businesses should be emphasizing visibility, early threat detection, and focusing on understanding ‘normal’ activity rather than ‘bad.’
Marc Solomon's picture
Security tools need to integrate with a centralized repository of relevant, prioritized threat intelligence, and with all your security controls.