Security Experts:

More Security Headlines

CloudKnox Security has raised $12 million in a new funding round, which brings its total funding to $22.75 million. [Read More]
Several serious vulnerabilities have been found by researchers in patient monitoring products made by GE Healthcare. The vendor is working on patches. [Read More]
A targeted phishing campaign against government entities in Persian Gulf and Middle East countries is leveraging the killing of Iranian general Qasem Suleimani. [Read More]
United Nations experts have called for an investigation by the United States and others into information they received that suggests that Jeff Bezos' phone was hacked after receiving a file sent from Saudi Crown Prince Mohammed bin Salman's WhatsApp account. [Read More]
Data security startup Privafy has emerged from stealth mode with $22 million in funding, which it will use to scale product development. [Read More]
Recent attacks aimed at a key organization in the European energy sector involved PupyRAT, a piece of malware used by Iran-linked threat groups. [Read More]
Mastercard's new cyber center in Vancouver is sited at the refurbished Old Stock Exchange Building, where Mastercard subsidiary NuData is also located. [Read More]
Two serious vulnerabilities found in Honeywell video surveillance systems can be exploited by hackers to take complete control of the system and access video feeds. [Read More]
The United States pressed France on Wednesday to take "strong security measures" against potential breaches from 5G services provided by Chinese telecommunications firm Huawei, saying failure to do so could imperil intelligence exchanges. [Read More]
Security vulnerabilities in some AMD ATI Radeon graphics cards could allow attackers to remotely execute code or cause a denial of service condition, researchers from Cisco Talos have warned. [Read More]

SecurityWeek Experts

rss icon

John Maddison's picture
Outpacing your security capacity with digital innovation is a formula for disaster that may take you out of the running in today’s highly competitive digital marketplace entirely.
Joshua Goldfarb's picture
Performing gap analysis well and remediating findings appropriately can help reduce both the number of weak points within your enterprise and your susceptibility to attack at each of them.
Gunter Ollmann's picture
CISOs are increasingly cognizant of the value deep integration of threat intelligence can bring to cloud protection platforms and bottom-line operational budgets.
AJ Nash's picture
Once we shed the shackles of “cyber” and “threat,” we free our teams to consider a full spectrum of intelligence, including support to physical security, insider threats, procurement, mergers and acquisitions, and executive decision-making.
Marc Solomon's picture
As a security professional you have several corrective measures available so you can efficiently and effectively make sense of massive volumes of data, understand what to work on next and know the right actions to take.
Torsten George's picture
Perimeter-based security, which focuses on securing endpoints, firewalls, and networks, provides no protection against identity- and credential-based threats.
Preston Hogue's picture
Retailers should ensure that they are proactively scanning for vulnerabilities in the website, as well as deploying a solution to monitor traffic.
Craig Harber's picture
Deep visibility allows organizations to see how different pieces of the overall cyber terrain are communicating with one another, enabling them to highlight potential or existing attack vectors.
Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.
Fred Kneip's picture
While some forward-thinking companies have created c-suite positions for IT and security personnel such as CTOs and CISOs, these are, overall, still relatively rare.