Security Experts:

More Security Headlines

USB drives serve as a physical medium for transmitting data to and from air-gapped systems. [Read More]
The Transportation Security Administration is issuing new directives and recommendations aimed at strengthening the cybersecurity defenses of U.S. rail and airport operators. [Read More]
Facebook Protect is meant to keep safe individuals at risk, such as government officials, human rights defenders, and journalists. [Read More]
Panther Labs, a startup that specializes in detection and response analytics, has raised a whopping $120 million in a new round of funding. [Read More]
Citing evidence of active exploitation against five specific vulnerabilities, the U.S. cybersecurity agency warned that further delays in applying fixes “pose significant risk to the federal enterprise. [Read More]
Please join us today at 1PM ET for a fireside chat with Steve Katz, the first ever Chief Information Security Officer. In this online session, Steve and Abnormal CISO Mike Britton will discuss: [Read More]
Another $10 million has been raised by Karamba Security, a firm that provides products and services for securing industrial, automotive, enterprise and consumer IoT systems. [Read More]
Within four months, the company has closed three funding rounds, raising over $140 million. [Read More]
The vulnerability could lead to application crashes and potentially enable arbitrary code execution. [Read More]
Earlier this year, Aleksandr Grichishkin admitted in court to being the founder and leader of a bulletproof hosting organization. [Read More]

SecurityWeek Experts

rss icon

Torsten George's picture
While it might be overwhelming to look at the critical threats on the horizon you need to prepare for, focusing on these predictions for 2022 will help you strengthen your security posture and minimize your organization’s risk exposure.
Yaniv Vardi's picture
If you’re a CISO or security leader, here are three questions to ask yourself as you consider this legislation and look to improve the security posture of your OT environment.
Laurence Pitt's picture
With tight resources for managing healthcare, the IT challenge to keep track of vast amounts of data being created, accessed and modified is critical.
Marie Hattar's picture
In order to deliver on the promise of 5G, we need new industry standards for security, testing, and training to proactively combat 5G cyber threats and minimize risks.
Marc Solomon's picture
Security Operations Centers do not need another acronym. What they need are capabilities that enable them to address their top use cases faster and more thoroughly in the face of evolving attacks.
Gordon Lawson's picture
For red teams, using an obfuscated network for testing offers the advantage of hiding who is performing the attack and where it is originating, for a more real-life context
Tim Bandos's picture
There’s no doubt that there are a lot of things on your CISO’s mind. Whether they have an active role at board meetings or not, chances are these are some of the most pressing items they’d like to discuss with you.
Jeff Orloff's picture
Most organizations rely too heavily on their cybersecurity pros to protect them from threats, ignoring the painful reality that human error is by far the most common cause of security breaches.
John Maddison's picture
Recent changes have resulted in a proliferation of devices and users working from anywhere, which has expanded the digital attack surface and exposed more applications, devices, data, and users to risk.
Keith Ibarguen's picture
One of the best approaches to identifying both the value you are bringing to a customer and opportunities to increase that value is by going on the change-journey with your customers.