Security Experts:

More Security Headlines

Drupal released an out-of-band security update just before Thanksgiving to patch code execution vulnerabilities for which exploit code exists. [Read More]
An unofficial patch is now available through ACROS Security’s 0patch service for a zero-day vulnerability identified earlier this month in Windows 7 and Windows Server 2008 R2. [Read More]
Manchester United has been unable to fully restore its computer systems a week after being targeted in a cyberattack. [Read More]
The European Union is laying out new standards for data giving Europeans more control over their personal information as it seeks to counter the power of U.S. and Chinese tech companies. [Read More]
Denmark’s biggest news agency has been hit by a ransomware attack that forced editorial systems to be shut down as about a quarter of its 100 servers have been damaged. [Read More]
Banking cybersecurity and cybercompliance solutions provider DefenseStorm on Tuesday announced that it raised $12 million in Series B funding, along with $7 million in growth capital financing. [Read More]
Specialty networking solutions provider Belden has disclosed a data breach resulting in the theft of employee and business information. [Read More]
cPanel last week released patches to address three vulnerabilities in cPanel & WebHost Manager (WHM), including one leading to two-factor authentication (2FA) bypass. [Read More]
Lightspin has emerged from stealth mode with a cloud security platform and $4 million in seed funding. [Read More]
Secure Access Service Edge (SASE) provider Cato Networks has raised $130 million in a Series E funding round led by Lightspeed Venture Partners. [Read More]

SecurityWeek Experts

rss icon

Torsten George's picture
Ultimately, organizations must assume that bad actors are already in their networks. And consumers must realize they’re constant targets.
Galina Antova's picture
In lock step with digital transformation projects, organizations are adopting the best practice of centralizing responsibility and accountability for securing the OT environment with the CISO.
AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Laurence Pitt's picture
To reap the benefits of 5G and ensure security, organizations must be smarter, fully educated and willing to work alongside the tech.
Marc Solomon's picture
When intelligence becomes a capability and not just subscriptions to feeds, we can gain the full value of intelligence as the foundation to security operations.
John Maddison's picture
SD-WAN connections are designed to constantly shift and adjust, replacing one connection that has become unstable with another without interrupting application performance.
Gunter Ollmann's picture
It is reasonable to assume that within five years the term “confidential compute” will become superfluous and an assumed native component of all cloud services.
Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Joshua Goldfarb's picture
I have noticed some common threads that run through both good and bad advice, particularly in the security field.
Derek Manky's picture
It’s amazing how foundational security principles, consistently implemented, can help defeat the craftiest attack vector.