Security Experts:

More Security Headlines

Redwood, California-based anti-phishing firm Area 1 Security has raised $25 million in a Series D funding round led by ForgePoint Capital. [Read More]
A Russian national pleaded guilty last week for his role in an international cyber theft ring that caused losses of more than $568 million. [Read More]
Magecart web skimmers were found on the websites of eight cities in the United States and one thing they have in common is that they all use the Click2Gov platform. [Read More]
Honeywell announced recently that it has added several new features to its Forge cybersecurity platform. [Read More]
University of California San Francisco (UCSF) revealed that it paid roughly $1.14 million to cybercriminals to recover data encrypted during a ransomware attack earlier this month. [Read More]
Breach protection solutions provider Cynet has raised $18 million in a Series B+ funding round, which brings the total raised by the company to $38 million. [Read More]
A data breach has impacted Maine State Police’s information sharing database for federal, state and local law enforcement officials, the agency confirmed late Friday. [Read More]
Many companies view the SOC as a key part of their security strategy, but SOC staff complain about high stress and the lack of proper tools. [Read More]
At least 31 organizations in the United States have been targeted with the recently detailed WastedLocker ransomware. [Read More]
A Russian computer hacker who facilitated $20 million in credit card fraud and ran a sophisticated clearinghouse for international cybercriminals was sentenced to nine years in prison. [Read More]

SecurityWeek Experts

rss icon

Preston Hogue's picture
Telecom service providers need protections for everything from their back-end networks to cell towers to billions of devices in users’ hands.
Marc Solomon's picture
The LEAD threat intelligence framework is a perfect example of the symbiosis between technology and people to strengthen security posture.
John Maddison's picture
Network connections that can change instantaneously in response to shifting business requirements can take a security solution minutes or hours to be reconfigured. And that lag time is prime for exploitation.
Laurence Pitt's picture
Working remotely should be a positive experience. Here are a few simple suggestions that may help during this time of change.
Joshua Goldfarb's picture
With the COVID-19 (Coronavirus) outbreak, business continuity, supply chain risk, and remote access have come to the forefront as security challenges that the business must deal with.
Gunter Ollmann's picture
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.
Galina Antova's picture
As the size of the remote workforce surges, network administrators of operational technology (OT) networks find themselves on the front lines of enablement.
Torsten George's picture
Static passwords lack the ability to verify whether the user accessing data is authentic or just someone who bought a compromised password.
Alastair Paterson's picture
The barriers to entering the field of cybercrime have been significantly lowered, and for modest amounts of money, would-be scammers can buy high-quality phishing tools online.
Marc Solomon's picture
It’s up to humans, guided by instinct, intelligence and experience, to determine the right data, so they can focus on what matters to the organization, make better decisions and take the right actions.