Security Experts:

More Security Headlines

Singapore’s Ministry of Health (MOH) said that a Singapore Health Services database containing patient data, including personal information on Prime Minister Lee Hsien Loong, was hit by a “major” cyberattack. [Read More]
Adobe patches potentially serious code injection vulnerability affecting some of its internal systems, but the company downplayed its impact [Read More]
HR services firm ComplyRight informs customers of a security incident involving its tax reporting platform. Personal information of many individuals possibly compromised [Read More]
A publicly accessible Amazon Web Services S3 bucket belonging to political autodial firm Robocent was exposing hundreds of thousands of United States voter records. [Read More]
Industry professionals comment on the U.S. indicting 12 Russian intelligence officers for hacking the Democratic Party in an effort to interfere in the 2016 presidential election [Read More]
Burlington, North Carolina-based LabCorp took some of its systems offline last weekend after discovering that some had been infected by ransomware. [Read More]
Enterprise identity management firm Okta has acquired ScaleFT, a company that offers a Zero Trust access control platform. [Read More]
ABB is working to patch a serious arbitrary code execution vulnerability in its Panel Builder 800 tool. Until a fix becomes available, the company has provided some mitigations [Read More]
Cisco finds and patches critical flaws in Policy Suite, and high severity flaws in SD-WAN, WebEx Network Recording Player, and Nexus 9000 switches [Read More]
A SpiderLabs security researcher has published details of what he considers to be a vulnerability in the RLM web application provided by Reprise Software. Reprise CEO Matt Christiano has told SecurityWeek, it is not a vulnerability. [Read More]

SecurityWeek Experts

rss icon

Laurence Pitt's picture
Safeguarding emerging IoT ecosystems involves embedding visibility and protection into the fabric of the IoT network.
Alastair Paterson's picture
Given the uncertain future of dark web marketplaces and the clandestine nature of insider activity, specialized insider marketplaces are emerging.
Lance Cottrell's picture
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
Erin O’Malley's picture
When ransomware strikes, there aren’t many options for response and recovery. Essentially, you can choose your own adventure and hope for the best.
Marc Solomon's picture
The human element will always remain vital in security operations, but automation will allow us to move through processes faster for better decisions and accelerated action.
Ashley Arbuckle's picture
We’ve seen an evolution from more traditional simulation exercises that use a Red Team to identify vulnerabilities and launch mock attacks and a Blue Team to detect and respond to attacks, to Purple Teaming exercises.
Steven Grossman's picture
Adding automation to the incident response process requires consideration of the possible threat vectors and the associated actions necessary to respond to those vectors.
Rafal Los's picture
Boards used to care only about one thing - that your company didn't get breached on their watch. Those days, sadly, are behind us.
John Maddison's picture
Analysis of a vendor’s underlying design and optimization approaches will enable you to select the solution that best meets your organization’s performance and budgetary requirements.
Joshua Goldfarb's picture
In security, one of our goals should always be to broaden our perspective, field of view, and horizons to minimize the risk that we will be blindsided by something we didn’t see coming.