Security Experts:

More Security Headlines

This is the 16th documented in-the-wild zero-day exploitation of security defects in Apple’s iOS and macOS platforms so far this year. [Read More]
Cowbell Cyber aims to fill a gap in the cyber-insurance ecosystem with products that continuously monitor customers systems to find weaknesses that can be fixed so that insurance can be offered with greater confidence. [Read More]
The company will use the investment to expand marketing and sales initiatives and accelerate product roadmap. [Read More]
An Indian media conglomerate, a police department and the agency responsible for the country’s national identification database have been hacked, likely by a state-sponsored Chinese group. [Read More]
Support for the TLS 1.0 and 1.1 protocols will be completely removed from the company’s mobile and desktop platforms. [Read More]
Third-party security risk management company Panorays announced raising $42 million in a Series B funding round. [Read More]
The vulnerabilities could be exploited to execute arbitrary code remotely, cause a denial of service condition, or manipulate device configuration. [Read More]
The internet is already being scanned for VMware vCenter servers affected by CVE-2021-22005, a critical vulnerability patched just days ago. [Read More]
Adversaries used malicious documents targeting the MSHTML vulnerability tracked as CVE-2021-40444 to compromise Russian state rocket center and interior ministry. [Read More]
Facebook said Wednesday that Apple's iPhone privacy changes, which allow users to block tracking, significantly affected its advertising revenues because less data could be collected. [Read More]

SecurityWeek Experts

rss icon

John Maddison's picture
Organizations considering ZTNA should look for these three essential components as a minimum when evaluating any solution.
Keith Ibarguen's picture
Far too many engineers in the trenches don’t take the time to lift their heads to see context, so when good (and bad) things happen, this is a great management opportunity that you should take full advantage of.
Marc Solomon's picture
Enterprises can't rely on Endpoint Protection Platforms (EPP) or Endpoint Detection and Response (EDR) tools to detect suspicious activity on a user’s system to quarantine the system or even to reimage.
Idan Aharoni's picture
Despite having different infrastructure, goals and methods, threat actors do not work in a vacuum. They feed off of each other.
Derek Manky's picture
How can organizations fight ransomware? The best solution is always prevention. Here are three tactics toward that goal.
Tim Bandos's picture
When it comes to ensuring cyber talent retention, establishing the right working environment is critical to keeping people engaged and motivated to stay.
Gordon Lawson's picture
Current cloud deployments pose significant risks that could be mitigated with minor changes to infrastructure procurement and access.
Torsten George's picture
As it has become clear that remote/hybrid work is here to stay, IT security practitioners must figure out how to enable a secure and resilient anywhere workforce to minimize their future risk exposure.
Jeff Orloff's picture
It’s important to show the effectiveness of training initiatives. Managers want to make sure that they're getting a return on their investment and justify future training budgets requests.
Laurence Pitt's picture
We have had to accelerate into remote and now hybrid working models over the last year and a half. Now that we are getting back to work, there is still much to do as everything moves fast.