Security Experts:

More Security Headlines

Venafi has uncovered over 100,000 fake domains with valid TLS certificates that mimic the domains of 20 major retailers in the US, UK, Australia, Germany and France. [Read More]
Messaging app LINE launches public bug bounty program with rewards of up to $30,000. [Read More]
Virtualization company Corellium says it was sued by Apple after the tech giant failed to acquire its technology for the price it wanted. [Read More]
Symantec Endpoint Protection is the latest antivirus product found to unsafely load DLLs into a process that runs with SYSTEM privileges. [Read More]
Retailers are spending their budgets on improving their e-commerce platforms to receive money while neglecting to invest adequately in security. [Read More]
A new JavaScript skimmer targets data entered into the payment forms of ecommerce merchant websites, Visa warns. [Read More]
The Iran-linked group tracked as APT33 uses obfuscated botnets for attacks aimed at high-value targets located in the United States, the Middle East and Asia. [Read More]
American not-for-profit organization MITRE launches a tech foundation focused on strengthening critical infrastructure through partnerships with the private sector. [Read More]
Australia announced measures to combat foreign interference at its universities Thursday, setting new guidelines around the key areas of research collaboration, cybersecurity, and international partnerships. [Read More]
Facebook said it has taken down roughly 5.4 billion fake accounts in 2019 in a sign of the persistent battle on social media against manipulation and misinformation. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Joshua Goldfarb's picture
When the security of our organization depends on us leaving our comfort zone, how can we ensure that we accomplish what we set out to do without putting the organization at additional risk?
Craig Harber's picture
Because attackers will exploit the paths of least resistance and move laterally through the enterprise, visibility must include all managed and unmanaged assets (enterprise IoT, shadow IoT, legacy systems, etc.)
Marc Solomon's picture
As the holiday approaches, I thought I’d take the opportunity to share three things I believe every security professional can give thanks for.
John Maddison's picture
Security-Driven Networking is a new, strategic approach to security that enables the seamless expansion of network environments and services without ever compromising on security.
Jim Ducharme's picture
In just about every case of digital identity, there seems to be a set of credential recovery mechanisms that are weaker than the authentication method itself.
Josh Lefkowitz's picture
It’s crucial to recognize that annual security predictions generally only include that which can be feasibly predicted by the final months of the prior year.
Alastair Paterson's picture
Domain name typo-squatting is an established tactic in the world of cybercrime.
Torsten George's picture
Organizations should recognize that not all authenticators are equally vulnerable to the mechanisms used to break the trust chain, which range from simple guesswork to coercion.
Barak Perelman's picture
While pharmaceutical operations networks were once siloed, today their connection to IT and anywhere access has created an environment that threatens the integrity of drug formulation control systems.