Security Experts:

More Security Headlines

The San Francisco Employees’ Retirement System (SFERS) this week disclosed a data breach that impacted over 70,000 of its members. [Read More]
Cisco has patched tens of vulnerabilities in its IOS software, including a dozen flaws affecting the company’s industrial routers and switches. [Read More]
Cisco Talos researchers discovered two vulnerabilities in the Zoom client application that can allow arbitrary file writing and could lead to remote code execution. [Read More]
For more than five months, Lastline researchers have tracked the evolution of malicious Excel 4.0 (XL4) macros, observing the fast pace at which malware authors change them to stay ahead of security tools. [Read More]
Zoom says it will not offer end-to-end encryption to free users so that the FBI or local law enforcement can conduct investigations. [Read More]
Trustwave has disclosed the details of several vulnerabilities affecting SAP Adaptive Server Enterprise (ASE), with most rated critical and high severity. [Read More]
AppOmni's Enterprise Essentials is designed to automate the process of achieving best security practices in each and all the major SaaS platforms, and to provide visibility into what is happening within and between cloud servers. [Read More]
Firefox 77 and Tor Browser 9.5 were released this week with patches for a variety of vulnerabilities, including several rated high severity. [Read More]
A newly introduced bipartisan bill seeks to provide individuals with increased control over the sharing of data with services designed to notify them if they have been exposed to the COVID-19 coronavirus. [Read More]
Private equity investment company Thoma Bravo announces intention to acquire secure business collaboration solutions provider Exostar, reportedly for $100 million. [Read More]

SecurityWeek Experts

rss icon

John Maddison's picture
Smart businesses are learning that SD-WAN can play a critical role in quickly—and securely—rolling out new networking environments, and connecting resources and users to data and applications.
Marc Solomon's picture
With capabilities to quickly curate and integrate new threat data sources across your operations, you’re prepared for whatever the future brings.
Galina Antova's picture
When your core business operations, digital transformation initiatives and workers’ ability to do their jobs are at risk, effective OT security must become just as ubiquitous
John Maddison's picture
By combining ML and AI with a team of advanced cybersecurity professionals to deploy true AI-driven security operations, organizations can stay a step ahead of cybercriminals.
Laurence Pitt's picture
Every business is likely to be subject to cyberattacks at some point, and the option is to either take on the cost of putting measures in place before it happens or paying to clean up after.
Torsten George's picture
Today’s economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.
Joshua Goldfarb's picture
Most security organizations realize that, regardless of how much progress they’ve made towards improving maturity and efficiency, there is still more work to be done.
Idan Aharoni's picture
Many organizations are steadfast in their belief that dark web monitoring is a critical part of their security operations and the security industry is happy to fuel that belief.
Marc Solomon's picture
With an extensible platform and flexible data model, you can take full advantage of the volume and variety of data to gain insights, and the technologies in your ecosystem to accelerate detection and response and mitigate risk.
Alastair Paterson's picture
Researchers have undertaken a deep dive into the shadowy, cyber world of those whose work involves abusing others online through trickery, extortion, fraud, and theft resulting from COVID-19.