Security Experts:

More Security Headlines

There is concern that GDPR and other cybersecurity laws have a common unintended consequence: in protecting people from cybercriminals, the laws also protect cybercriminals from security researchers. [Read More]
Former CIA employee, aged 29, charged for providing classified information to WikiLeaks, hacking, and possession of child pornography [Read More]
The Betabot Trojan is being spread in a multi-stage attack that starts with malicious Office documents attempting to exploit a 17-year old vulnerability. [Read More]
The US Senate defied President Donald Trump by voting Monday to overrule his administration's deal with Chinese telecom firm ZTE and reimpose a ban on high-tech chip sales to the company. [Read More]
A newly added “Endpoint Verification” feature in G Suite provides administrators with increased visibility into the computers that have access to corporate data. [Read More]
Malware-laden Syscoin releases were up for download on an official GitHub repository after hackers managed to compromise an account and replace legitimate Windows installers. [Read More]
In the run-up to Mexico's July 1 presidential election, a website operated by the rightist National Action Party (PAN) was taken off-line for several hours by a DDoS attack. [Read More]
Roughly 400 cameras from Axis are exposed to remote attacks due to several critical vulnerabilities discovered by researchers. Patches are available [Read More]
DHS and FBI publish another report describing a piece of malware allegedly used by the North Korean government. The malware is tracked as 'Typeframe' [Read More]
UK-based start-up Tessian, which uses machine learning artificial intelligence to prevent sensitive data leakage via email, has raised $13 million in a Series A funding. [Read More]

SecurityWeek Experts

rss icon

Jalal Bouhdada's picture
Jalal Bouhdada, Founder and Principal ICS Security Consultant at Applied Risk, discusses the physical and cyber security threats facing the increasingly smart car.
Josh Lefkowitz's picture
With so many intelligence teams blinded by vast amounts of data and an overwhelmingly complex threat landscape, establishing the right intelligence requirements (IRs) can be challenging.
Steven Grossman's picture
The typically fragmented “best of breed” security architecture of many large enterprises results in protective gaps, vendor management challenges and finger pointing.
Stan Engelbrecht's picture
The principles of automation and orchestration are necessary to counter the skills and resource gap, and their impact is amplified when applied across the broader picture of cybersecurity, compliance, risk and case management.
Alastair Paterson's picture
By closely following trends watching for new activities and actors across a variety of data sources, security professionals can continue to take steps to mitigate the digital risk to their enterprises, partners and customers.
Laurence Pitt's picture
Despite the long ramp-up towards the GDPR compliance deadline, the effects of the new regulations are still very much in infancy.
Travis Greene's picture
GDPR is proving disruptive for European citizens who are no longer able to interact with services from outside the EU. And the compliance costs can be significant as well. But are there legitimate concerns of overreach?
Justin Fier's picture
With many companies’ security tools numbering into the dozens, it is hardly surprising that all too often security teams suffer from alert fatigue and burnout – while genuine threats slip through the cracks.
Barak Perelman's picture
The new connectivity between IT and OT has created a clear and present cyber threat to previously isolated ICS environments.
Ashley Arbuckle's picture
What can you do to mitigate the risk you may be inadvertently introducing to your public cloud deployments?