Security Experts:

More Security Headlines

A cyberattack on a software company has disrupted unemployment benefits and job seeking assistance for thousands of people in several states. [Read More]
Cybersecurity startup oak9 has attracted new interest from venture capitalists with Cisco Investments and Morgan Stanley’s Next Level Fund joining a new $8 million funding round. [Read More]
The infamous North Korean Lazarus hacking group is the prime suspect in the $100 million hack of Harmony’s Horizon Bridge, according to new data and research from Elliptic. [Read More]
Token raises $13 million in Series B funding led by Grand Oaks Capital to accelerate development of wearable authentication solutions. [Read More]
New security alerts in Google Workspace will notify admins when changes are made to admin accounts or SSO profiles. [Read More]
For nearly two years, a sophisticated malware campaign has been targeting small office/home office routers with the ZuoRAT remote access trojan (RAT). [Read More]
Vulnerabilities found in Brocade (Broadcom) software could impact the storage solutions of several major companies. [Read More]
A malicious application on the user’s phone could have stolen the Amazon access token from the Amazon Photos application. [Read More]
After being extradited to the United States, a former Canadian government employee has pleaded guilty to charges related to his role in NetWalker ransomware attacks. [Read More]
A cyberattack temporarily knocked out public and private websites in Norway in the past 24 hours, Norwegian authorities said June 29th. [Read More]

SecurityWeek Experts

rss icon

Laurence Pitt's picture
It was great to be back in-person at security events, and I enjoyed meeting with people and discussing our solutions face-to-face.
Galina Antova's picture
Over the last few years, the pandemic and work from home paradigm shift have accelerated the convergence of IT and OT networks and necessitated a consolidated strategy to address cyber risks across cyber-physical systems (CPS).
Marc Solomon's picture
Security orchestration is about getting multiple systems in the Security Operations Center (SOC) to work together so you can detect, remediate and respond across the infrastructure.
John Maddison's picture
Digital acceleration, user demand, and shifting business strategies add new edges to the network, making it increasingly difficult to manage and even harder to secure.
Jeff Orloff's picture
The Defense Readiness Index is a reliable alternative for assessing a security team’s skill level, developing a roadmap for improving cyber competencies, and reaching the optimal level of cyber security readiness.
Joshua Goldfarb's picture
We can learn a valuable lesson about better fraud decision-making from restaurant choosing scenarios.
Derek Manky's picture
Malware and targeted attacks on operating systems and firmware have become increasingly destructive in nature, and these more nefarious attack methods are rising in prevalence.
Landon Winkelvoss's picture
Fusion centers are able to converge cyber and physical security, close gaps in coverage, and scale security to protect facilities and hundreds of thousands of employees.
Galina Antova's picture
There are no easy solutions to close the operational technology (OT) cybersecurity talent gap, but here are few ideas to help you get started.
Torsten George's picture
Digital experience monitoring technology goes beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.