Security Experts:

More Security Headlines

The U.S. National Security Agency says a Russian military hacking group has been exploiting a major email server program since last August or earlier. [Read More]
Google this week announced an expansion for its Vulnerability Rewards Program (VRP) to include critical open-source dependencies of Google Kubernetes Engine (GKE). [Read More]
Threat actors have targeted industrial suppliers in Japan and several European countries in sophisticated attacks that employed various techniques to make malware detection and analysis more difficult. [Read More]
The US state of Arizona filed a lawsuit Wednesday accusing Google of committing fraud by being deceptive about gathering location data. [Read More]
Crowdsourced security testing provider Synack on Thursday announced that it closed a $52 million Series D funding round, bringing the total raised by the company to $112.1 million. [Read More]
Researchers say they have found the real identity of a Brazilian hacker who defaced thousands of websites as part of hacktivist operations and who was also involved in profit-driven cybercrime. [Read More]
Recent versions of the Valak malware have been used in attacks targeting Microsoft Exchange servers at organizations in the United States and Germany. [Read More]
Google says an Iran-linked hacker group known as Charming Kitten has targeted healthcare and medical professionals, including WHO employees. [Read More]
Israel’s national cyber chief officially acknowledged the country had thwarted a major cyber attack last month against its water systems, an assault widely attributed to arch-enemy Iran. [Read More]
In this CISO Conversations feature, SecurityWeek talks to Mastercard CISO Ron Green, and Ellie Mae CISO Selim Aissi from the finance sector, concentrating on the people problem for CISOs. [Read More]

SecurityWeek Experts

rss icon

Preston Hogue's picture
Telecom service providers need protections for everything from their back-end networks to cell towers to billions of devices in users’ hands.
Marc Solomon's picture
The LEAD threat intelligence framework is a perfect example of the symbiosis between technology and people to strengthen security posture.
John Maddison's picture
Network connections that can change instantaneously in response to shifting business requirements can take a security solution minutes or hours to be reconfigured. And that lag time is prime for exploitation.
Laurence Pitt's picture
Working remotely should be a positive experience. Here are a few simple suggestions that may help during this time of change.
Joshua Goldfarb's picture
With the COVID-19 (Coronavirus) outbreak, business continuity, supply chain risk, and remote access have come to the forefront as security challenges that the business must deal with.
Gunter Ollmann's picture
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.
Galina Antova's picture
As the size of the remote workforce surges, network administrators of operational technology (OT) networks find themselves on the front lines of enablement.
Torsten George's picture
Static passwords lack the ability to verify whether the user accessing data is authentic or just someone who bought a compromised password.
Alastair Paterson's picture
The barriers to entering the field of cybercrime have been significantly lowered, and for modest amounts of money, would-be scammers can buy high-quality phishing tools online.
Marc Solomon's picture
It’s up to humans, guided by instinct, intelligence and experience, to determine the right data, so they can focus on what matters to the organization, make better decisions and take the right actions.