Security Experts:

More Security Headlines

Australian police are investigating a purported hacker’s release of the stolen personal data of 10,000 Optus customers and demand for a $1 million ransom in cryptocurrency. [Read More]
Russian President Vladimir Putin has granted Russian citizenship to former U.S. security contractor Edward Snowden, according to a decree signed Monday by the Russian leader. [Read More]
The Ukrainian government is proactively warning that Russia is planning “massive cyberattacks” against critical infrastructure targets in the energy sector. [Read More]
Hackers who crippled a French hospital and stole a trove of data last month have released personal records of patients online, officials have confirmed. [Read More]
The Australian government is considering tougher cybersecurity rules for telecommunications companies and blamed wireless carrier Optus, for a massive breach of personal data from 9.8 million customers. [Read More]
American Airlines discovered it was breached after receiving reports of employee email accounts being used in phishing attacks. [Read More]
A 17-year-old from the UK has been arrested on suspicion of hacking for his alleged involvement in the recent Rockstar Games and Uber hacks. [Read More]
Ukrainian authorities take down a hacking group that compromised roughly 30 million user accounts and sold them on dark web portals. [Read More]
Microsoft has dismantled a malicious campaign in which OAuth applications deployed on compromised cloud tenants were used to distribute spam messages. [Read More]
Hacktivists might not know a lot about ICS, but they’re well aware of the potential implications of hacking these devices, and some groups have been targeting ICS to draw attention to their cause. [Read More]

SecurityWeek Experts

rss icon

Keith Ibarguen's picture
It is encouraging to see the many strategic activities happening in cyber policy among the world’s most powerful nations.
Derek Manky's picture
We hear a lot about drug mules, but what are cyber mules? It’s similar to how drug dealers rely on unsuspecting or otherwise vulnerable people to help them transport drugs or launder the proceeds of those sales.
John Maddison's picture
Universal ZTNA is the easiest and most effective way to ensure that every user and device has secure access to the applications they need to do their jobs.
Torsten George's picture
When establishing visibility and security controls across endpoints, security practitioners need to understand that each endpoint bears some or all responsibility for its own security.
Gordon Lawson's picture
Zero trust is a great way to approach security, but we need to change the paradigm to prevent threats, instead of just detecting them.
Joshua Goldfarb's picture
By understanding how to identify, isolate, and remove unwanted bot and fraud traffic, enterprises can remove the noise clouding the visibility they have into their online applications.
Marc Solomon's picture
The goal of security automation is to accelerate detection and response, but you’ll waste a lot of time if you try to eat the elephant all at once.
Laurence Pitt's picture
A well-implemented ZTNA with the ‘trust-no-one, assume nothing’ mantra is also a great tool to mitigate potential attacks.
Marie Hattar's picture
For Smart Cities to truly live up to their promise, we shouldn’t forget that – like all infrastructure – safety and security are a top priority.
Joshua Goldfarb's picture
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.