Security Experts:

More Security Headlines

The Supersingular Isogeny Key Encapsulation (SIKE) algorithm, submitted to the NIST post-quantum encryption competition – and one that made it to the fourth round – has been defeated. [Read More]
Cybersecurity firm CyberX9 found critical vulnerabilities in Policybazaar's internet-facing network that could expose sensitive personal and financial data from at least 11 million insurance customers to hackers. [Read More]
Israeli cybersecurity startup Mesh Security emerged from stealth mode with a Zero Trust Posture Management (ZTPM) solution. [Read More]
The number of ransomware attacks on industrial organizations dropped from 158 in Q1 to 125 in Q2, and it may be related to the shutdown of the Conti operation. [Read More]
Intel has released 27 advisories addressing approximately 60 vulnerabilities in device firmware, software libraries, and endpoint and data center management solutions. [Read More]
New research shows that cyberattack victims are often attacked by multiple adversaries – usually, in rapid succession but sometimes simultaneously. [Read More]
A recently patched UnRAR vulnerability is being exploited in the wild, most likely against Zimbra email servers. [Read More]
SAP has announced the release of five new and two updated security notes as part of its August 2022 Security Patch Day. [Read More]
Former Twitter worker Ahmad Abouammo was found guilty on of spying for Saudi officials keen to unmask critics on the platform. [Read More]
The race to mitigate a gaping authentication bypass vulnerability in VMware Workspace ONE Access, Identity Manager and vRealize Automation products just got a lot more urgent. [Read More]

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
By understanding how to identify, isolate, and remove unwanted bot and fraud traffic, enterprises can remove the noise clouding the visibility they have into their online applications.
Marc Solomon's picture
The goal of security automation is to accelerate detection and response, but you’ll waste a lot of time if you try to eat the elephant all at once.
Laurence Pitt's picture
A well-implemented ZTNA with the ‘trust-no-one, assume nothing’ mantra is also a great tool to mitigate potential attacks.
Marie Hattar's picture
For Smart Cities to truly live up to their promise, we shouldn’t forget that – like all infrastructure – safety and security are a top priority.
Joshua Goldfarb's picture
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.
Marc Solomon's picture
With an approach that is data-driven and flexible, you can get as simple or as advanced as the detection and response demands.
Derek Manky's picture
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Gordon Lawson's picture
The adoption of IoT technology used to connect SCADA systems to the internet either directly or indirectly dramatically increases the risk of a successful exploit.
Laurence Pitt's picture
It was great to be back in-person at security events, and I enjoyed meeting with people and discussing our solutions face-to-face.
Galina Antova's picture
Over the last few years, the pandemic and work from home paradigm shift have accelerated the convergence of IT and OT networks and necessitated a consolidated strategy to address cyber risks across cyber-physical systems (CPS).