Security Experts:

More Security Headlines

Rockville, Maryland-based startup Sepio Systems, a rogue device mitigation firm, has raised a further $4 million that supplements the Series A round of $6.5 million announced in November 2019. [Read More]
A global survey of 1,000 IT security professionals has revealed that over 70% would rather protect corporate networks than industrial organizations. [Read More]
The FBI shut down a Russian-based online platform where various cybercrime products and services were being sold. [Read More]
Security patches released this week by Apple for many of its products address a variety of vulnerabilities, including multiple issues that could lead to arbitrary code execution on the affected devices. [Read More]
A Chinese threat actor tracked as APT41 has targeted organizations worldwide by exploiting vulnerabilities in Citrix, Cisco and Zoho ManageEngine products. [Read More]
Investors and industry professionals discuss the impact of the COVID-19 coronavirus pandemic on early-stage venture investment in cybersecurity. [Read More]
Hundreds of publicly available ICS hacking tools, many of which have been developed by researchers, lower the bar for threat actors looking to target OT networks, FireEye warns. [Read More]
GE says the personal information of some employees may have been compromised as a result of a data breach suffered by Canon Business Process Services. [Read More]
Vulnerabilities that Videolabs addressed recently in its libmicrodns library could lead to denial of service (DoS) and arbitrary code execution. [Read More]
VMware has made a second attempt at fixing a privilege escalation vulnerability in Fusion for Mac, but this patch is incomplete as well. [Read More]

SecurityWeek Experts

rss icon

Jim Ducharme's picture
If there’s one thing you can be sure of about user authentication methods today, it’s that determining the best choice isn’t as simple or straightforward as it used to be.
Marc Solomon's picture
When you’re at RSAC next week remember the “Human Element” is a great lens through which you can view and help assess the value of companies you partner with for security.
Laurence Pitt's picture
What can we do in order to prevent the spread of fake content or reduce the risk of a targeted use of Deepfakes that could cause damage to our organization?
Preston Hogue's picture
The ability to look deeply into user and system behavior and identify the smallest anomaly will become the essential toolkit to stem the tide of fraud and theft in financial services.
John Maddison's picture
Physical and virtual security appliances traditionally suffer from performance challenges, especially when it comes to critical functions such as inspecting encrypted traffic.
Torsten George's picture
Most of today’s cyber-attacks are front ended by phishing campaigns. So, what can organizations do to prevent their users from falling for the bait of these attacks?
Galina Antova's picture
We are at a stage where adversaries regularly operate below the threshold of armed conflict, using their powerful warcraft for economic and political advantage while maintaining plausible deniability.
Josh Lefkowitz's picture
As the technology and tools to leverage stolen credentials advance, defenders should seek out innovative new ways to proactively flag exposed passwords leveraging insights gleaned from illicit communities and open-web dumps.
Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Joshua Goldfarb's picture
Gap analysis can serve as a wonderful driver for improving security metrics if the security team understands how to seize the opportunity it presents.