Security Experts:

More Security Headlines

Researchers have disclosed the details of new timing and power-based side-channel attacks that affect all AMD CPUs. [Read More]
ThreatMapper helps organizations scan, map, and rank application vulnerabilities across containers, serverless, and multi-cloud environments. [Read More]
Juniper Networks this week released more than 40 security advisories describing over 70 vulnerabilities that affect the company’s products. [Read More]
South Korea said Friday it’s asked Interpol for help to arrest two foreigners it alleges played a leading role in cyberattacks and large-scale extortion that targeted South Korean and U.S. companies. [Read More]
With 6,000 out of 30,000 observed clusters of activity, GandCrab emerged as the most active ransomware family wreaking havoc on the Windows ecosystem. [Read More]
By sending maliciously crafted gift NFTs, hackers could hijack user accounts and empty their wallets. [Read More]
An Israeli hospital was targeted Wednesday by a ransomware attack, officials said, with the state's cyber directorate calling it the first such attack on a hospital in the country. [Read More]
With this extension, the company raised a total of $205 million in Series D funding, at a valuation of $1.35 billion. [Read More]
Hackers claim to have stolen 60 GB of data, including information on millions of customers, after breaching Acer India servers. [Read More]
Data privacy compliance startup CYTRIO announces its launch with $3.5 million in seed funding. [Read More]

SecurityWeek Experts

rss icon

Keith Ibarguen's picture
Leverage the power of the collective - the network effect – for its ever-evolving intelligence wherever possible to keep your employees free of all the bad stuff that has made it to their inboxes.
Gordon Lawson's picture
Most cyber insurance providers are demanding that companies supply proof of their backup implementation in order to obtain an affordable policy.
Derek Manky's picture
Botnets are becoming more malicious, sometimes able to create hundreds of thousands of drones that can attack a variety of machines, including Mac systems, Linux, Windows systems, edge devices, IoT devices, and so on.
Marc Solomon's picture
The goal of XDR is detection and response across the infrastructure, across all attack vectors, across different vendors, and across security technologies that are cloud based and on premises.
John Maddison's picture
Zero-trust network access (ZTNA) simplifies secure connectivity by providing seamless, per-use access to applications, no matter where the user or application may be located.
Torsten George's picture
While there is no silver bullet to prevent cybersecurity attacks, ZTNA has become a necessity for organizations on their digital transformation journey by allowing to minimize the attack surface while ensuring the productivity of remote workers.
Laurence Pitt's picture
Cybersecurity Awareness Month is an excellent time to reflect on any changes made, and that might still need to be made since, as for many people hybrid has become the working ‘normal.’
Landon Winkelvoss's picture
In addition to evaluating the core capabilities and range of intelligence monitoring, organizations must consider data source integrity, and perhaps most importantly, the level of expert analysis included with each service.
Joshua Goldfarb's picture
By rooting out ineffective security practitioners, you can keep your security teams protected and engaged in a productive manner.
John Maddison's picture
Organizations considering ZTNA should look for these three essential components as a minimum when evaluating any solution.