Security Experts:

More Security Headlines

The native PlingStore application is affected by an RCE, while marketplaces based on the Pling platform are exposed to potential supply chain attacks. [Read More]
The records of roughly 500,000 patients of an eye clinic with locations throughout Iowa may have been stolen as part of a ransomware attack on the business earlier this year. [Read More]
A threat actor appears to have repurposed the REvil ransomware code to create the LV ransomware and possibly launch a ransomware-as-a-service (RaaS) offering. [Read More]
Data security company Symmetry Systems has raised $15 million in Series A funding led by Prefix Capital and ForgePoint Capital. [Read More]
An attacker with access to a virtual machine could exploit the vulnerability to execute code with elevated privileges. [Read More]
Attorney General Merrick Garland says private industry needs better safeguards to avoid calamitous consequences in the event of cyberattacks like the ones that have targeted American infrastructure and corporations. [Read More]
Splunk announces receiving a $1 billion investment from Silver Lake, which the company will use to fund growth initiatives and manage its capital structure. [Read More]
A critical vulnerability patched by Palo Alto Networks in Cortex XSOAR can be exploited remotely without authentication to perform unauthorized actions. [Read More]
Iran said June 22, that several state-linked news websites have been seized by the U.S. government under unclear circumstances. [Read More]
A new version of the open-source Tor browser includes patches for multiple vulnerabilities, including one that allows websites to track users across browsers by identifying applications running on their devices. [Read More]

SecurityWeek Experts

rss icon

Torsten George's picture
Self-healing cybersecurity systems represent a major security and IT productivity advancement, allowing organizations to streamline the management and protection of today’s highly distributed infrastructures.
Joshua Goldfarb's picture
You may be asking yourself what adopting a pound dog has to do with security. To help answer it, I’d like to share five security lessons that my daughter taught me during a recent conversation on the topic.
Landon Winkelvoss's picture
Ineffective security approaches when integrating two separate organizations can lead to significant issues that could undercut the business value of a merger or acquisition.
Tim Bandos's picture
Before even thinking about approaching a vendor, talk at length about the project amongst yourselves. What problem are you trying to solve and how will you know when you’ve solved it?
Marie Hattar's picture
Security is never static, and networks will always be evolving, so make sure you’re continuously validating your security posture and ready for whatever comes next.
Idan Aharoni's picture
SPF, DMARC and DKIM are three email security methods that work together to prevent unauthorized third parties from sending emails on behalf of a domain.
John Maddison's picture
As enterprises adopt 5G networks and services to enable digital innovation across new network edges, they are also introducing new risks.
Marc Solomon's picture
As you determine what security technologies to invest in, develop not only a technology roadmap, but also include and align an operational roadmap.
Yaniv Vardi's picture
Adversaries are evolving their approaches and escalating attacks against industrial networks. They aren’t operating on our timelines, so we need to focus on what we can do next week and next month to reduce risk the most.
Laurence Pitt's picture
For many of us, RSA Conference 2020 in San Francisco was the last time we came together as a community, met with colleagues, and saw new technology offerings.