Security Experts:

More Security Headlines

A new Sophos firewall zero-day vulnerability tracked as ​​CVE-2022-3236 has been exploited in attacks aimed at organizations in South Asia. [Read More]
Endpoint security firm SentinelOne (NYSE: S) announced a $100 million venture fund that the company will use to invest other security startups. [Read More]
Microsoft has released an out-of-band security update for Endpoint Configuration Manager to patch a vulnerability that could be useful to malicious actors for moving around in a network. [Read More]
Chainguard announces Wolfi, a stripped-down Linux OS distribution designed to improve the security of the software supply chain. [Read More]
ISC has announced patches for multiple high-severity vulnerabilities impacting the BIND DNS software. [Read More]
CISA warns that threat actors are targeting a recently addressed remote code execution vulnerability in Zoho ManageEngine. [Read More]
Researchers have disclosed new firmware vulnerabilities that can be exploited by hackers to gain long-time access to any of the millions of affected devices. [Read More]
CISA and NSA have described the typical game plan of malicious actors targeting critical infrastructure control systems. [Read More]
Portugal’s national airline TAP Air Portugal says hackers obtained the personal data of some of its customers and have published the information on the dark web. [Read More]
Twitter has logged out some users from their accounts after learning of a security issue related to password resets. [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
With an approach that is data-driven and flexible, you can get as simple or as advanced as the detection and response demands.
Derek Manky's picture
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Gordon Lawson's picture
The adoption of IoT technology used to connect SCADA systems to the internet either directly or indirectly dramatically increases the risk of a successful exploit.
Laurence Pitt's picture
It was great to be back in-person at security events, and I enjoyed meeting with people and discussing our solutions face-to-face.
Galina Antova's picture
Over the last few years, the pandemic and work from home paradigm shift have accelerated the convergence of IT and OT networks and necessitated a consolidated strategy to address cyber risks across cyber-physical systems (CPS).
Marc Solomon's picture
Security orchestration is about getting multiple systems in the Security Operations Center (SOC) to work together so you can detect, remediate and respond across the infrastructure.
John Maddison's picture
Digital acceleration, user demand, and shifting business strategies add new edges to the network, making it increasingly difficult to manage and even harder to secure.
Jeff Orloff's picture
The Defense Readiness Index is a reliable alternative for assessing a security team’s skill level, developing a roadmap for improving cyber competencies, and reaching the optimal level of cyber security readiness.
Joshua Goldfarb's picture
We can learn a valuable lesson about better fraud decision-making from restaurant choosing scenarios.
Derek Manky's picture
Malware and targeted attacks on operating systems and firmware have become increasingly destructive in nature, and these more nefarious attack methods are rising in prevalence.