Security Experts:

More Security Headlines

A problem that halted trading on the Paris stock market and others across Europe was a "middleware" issue and not a cyber attack, operator Euronext said Tuesday. [Read More]
The NSA this week released an advisory containing information on 25 vulnerabilities that are being actively exploited or targeted by Chinese state-sponsored threat actors. [Read More]
Chinese state-sponsored hackers are targeting a Cisco Discovery Protocol vulnerability disclosed earlier this year. [Read More]
Sweden is banning Chinese tech companies Huawei and ZTE from building new high-speed wireless networks after a top security official called China one of the country’s biggest threats. [Read More]
Adobe has released security updates for 10 of its products, patching a total of 20 vulnerabilities. [Read More]
Control servers included in the configuration file of new TrickBot samples fail to respond to bot requests. [Read More]
Austin, Texas-based security product testing company NSS Labs has announced that it ceased operations on October 15, 2020. [Read More]
Identity intelligence company 4iQ raises $30 million in a Series C funding round, which brings the total raised to date to $63 million. [Read More]
GitHub paid out a $20,000 bug bounty for a high-severity arbitrary command execution vulnerability affecting GitHub Enterprise. [Read More]
The UK says Russia launched cyberattacks against organizations involved in the now-postponed 2020 Olympic and Paralympic Games that were set to take place in Tokyo this summer. [Read More]

SecurityWeek Experts

rss icon

Galina Antova's picture
How do we take what we’ve learned this year, capitalize on the change in mindset that it is possible to move fast, and apply it to seize the OT security opportunity in 2021?
Marc Solomon's picture
To gather the data and intelligence you need to fully detect and respond to threats, you need the ability to scale up and down the pyramid.
Preston Hogue's picture
Everywhere you go, you cast a shadow of data that, taken together, reveals who you are, what you like to do, your habits, your addictions.
John Maddison's picture
By understanding the latest threat trends, security teams can take measures to ensure that their security strategies, including the identification and tracking of new IOCs, are being correctly updated.
Torsten George's picture
The risk of company employees walking away with sensitive data or selling their access credentials has never been greater now that a record number of individuals have been laid off.
Galina Antova's picture
The COVID-19 crisis and its associated constraints has shown us that many of the activities we considered “priorities” before March are not really priorities.
Idan Aharoni's picture
Speak with security professionals who are involved in monitoring the Dark Web and you will probably end up getting varied responses as to what it is and what it is comprised of.
Gunter Ollmann's picture
The phrase “assume breach” has been transformational to enterprise security investment and defensive strategy for a few years but may now be close to retirement.
Marc Solomon's picture
While it may be a trendy term, in cybersecurity, intelligence pivoting is pivotal to detection and response.
Joshua Goldfarb's picture
A healthy dose of self-doubt can go a long way towards keeping us on our toes and continually improving the security posture of our respective organizations.