Security Experts:

More Security Headlines

Dropbox has suffered a data breach after employees fell for a phishing attack. The hackers gained access to source code and personal data. [Read More]
A missing authentication check vulnerability in Azure Cosmos DB could have allowed an attacker to execute arbitrary code remotely. [Read More]
CVE-2022-3602 was announced to be the first critical OpenSSL vulnerability found since 2016, but its severity has been downgraded to ‘high’. [Read More]
The FTC has reached an agreement with education technology provider Chegg over the company’s cybersecurity mishaps that led to several data breaches. [Read More]
Bed Bath & Beyond has suffered a data breach after an employee fell victim to a phishing attack. [Read More]
CISA, NSA, and ODNI have released a set of recommendations on how software suppliers can help secure the software supply chain. [Read More]
Nozomi Networks and SANS release their 2022 OT/ICS Cybersecurity Report, which shows that engineering workstations are increasingly used as an initial access vector. [Read More]
Twitter’s unending fight against spam accounts is now a problem for new owner Elon Musk, who pledged in April to defeat the bot scourge or “die trying!” [Read More]
Bearer, Notebook Labs, and Protexxa, cybersecurity startups dealing with data security, web3 identity, and enterprise cyber hygiene, received a total of over $10 million in seed funding. [Read More]
CISA, the FBI, and MS-ISAC have issued a joint guide to help federal agencies reduce the likelihood and impact of DDoS attacks. [Read More]

SecurityWeek Experts

rss icon

Jeff Orloff's picture
By focusing on attack tactics and techniques that pose clear and present danger to the business, a company can achieve the greatest return on its training initiatives.
Gordon Lawson's picture
The new SEC requirements are putting on paper what many companies—public and private—should have been investing in already.
Landon Winkelvoss's picture
How organizations can use managed services to optimize their threat intelligence program during an economic downturn.
Torsten George's picture
Here are five best practices for defeating against most attacks, hopefully making the need for future Cybersecurity Awareness Months obsolete.
Marc Solomon's picture
Within the context of security operations, anticipation teams use internal and external threat and event data across their security infrastructure for context and analytics and to become more proactive.
Marie Hattar's picture
Cybersecurity within the automotive industry has a long way to go to catch up to traditional enterprise cybersecurity standards and best practices.
Gordon Lawson's picture
Why are zero day exploits so effective, and so highly prized by bad actors? The reason has to do with the way cyber security defenses work.
John Maddison's picture
By integrating with native security services on major cloud platforms, a CNP solution can effectively correlate security findings to pinpoint risks and recommend effective mitigation.
Torsten George's picture
Unfortunately, there is no such thing as 100 percent protection. Therefore, we cannot solely focus on “Left of Boom” processes, but also have to talk about the “Right of Boom”.
Marc Solomon's picture
Cyberattacks and data breaches continue to rise year-over-year and another so-called silver bullet technology isn’t going to stop that trend.