Security Experts:

More Security Headlines

Researchers discover that the Foreshadow vulnerabilities affecting Intel processors can still be exploited, despite the mitigations and patches rolled out in 2018 when it was disclosed. [Read More]
Intel is investigating reports that a claimed hacker has leaked 20GB of data coming from the chip giant, which appear to be related to source code and developer documents and tools. [Read More]
The US Senate voted to bar TikTok from being downloaded onto US government employees' telephones, intensifying US scrutiny of the popular Chinese-owned video app. [Read More]
Twitter unveiled new steps to curb the spread of content from "state-affiliated media" used to advance a government's political agenda -- a move affecting key outlets from Russia and China. [Read More]
CISA has launched the Cyber Career Pathways Tool, which aims to lay out a career path for current and future cybersecurity professionals. [Read More]
Silverfort, a provider of an agentless, proxyless authentication platform, has raised $30 million in a Series B funding round led by Aspect Ventures. [Read More]
US Secretary of State Mike Pompeo on Wednesday offered a $10 million reward aimed at preventing foreign interference in the November election. [Read More]
Twitter has informed customers that a vulnerability in its Android app could have been exploited by malicious applications to access direct messages and other private data. [Read More]
U.S. Secretary of State Mike Pompeo said the US wants to see “untrusted Chinese apps” pulled from the Google and Apple app stores. [Read More]
A court hearing held via Zoom for a US teenager accused of masterminding a stunning hack of Twitter was interrupted with rap music and porn. [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
Most organizations have a complex security infrastructure that consists of multiple products from multiple vendors to create layers of defense.
Preston Hogue's picture
From a cybersecurity perspective, perhaps the greatest risk for digital education comes from the wide variation across districts in terms of resources.
Torsten George's picture
The tactics, techniques, and procedures (TTPs) used in the Twitter attack were not much different than in the majority of other data breaches and serve as valuable lessons for designing a modern cyber defense strategy.
Laurence Pitt's picture
Cybersecurity innovation is not quite at the stage where it needs resuscitation, still, the last few months have demonstrated the need for change.
Alastair Paterson's picture
Opportunities for accidental exposure of sensitive information are often compounded by multiple stakeholders using collaborative tools without the proper policies, oversight and security training.
AJ Nash's picture
Intelligence is one of a few vital security concepts that industries are increasing their investments in as they recognize the documented value of proactive security.
Marc Solomon's picture
Phil Jones who, who has overseen Operations within Airbus Cybersecurity since 2016, discusses some of the key takeaways from the current crisis.
Joshua Goldfarb's picture
Some security start-ups bring much needed creative thinking and new ideas to a challenging field. Others don’t bring much of anything to the table, and in some cases, can actually harm an organization’s security posture.
Galina Antova's picture
Three recommendations that can help foster acceptance for Digital transformation initiatives so that more companies can move quickly and drive business value.
Gunter Ollmann's picture
As SecOps teams increasingly take on proactive risk reduction, their vocabulary expands from security threats to include posture lapses, and posture fatigue will grow.