Security Experts:

More Security Headlines

Federal regulators are looking at drafting rules to crack down on what they call harmful commercial surveillance and lax data security. [Read More]
A team of researchers from the Technion research university in Israel is conducting an analysis of Siemens software controllers and they are gradually identifying security issues. [Read More]
A new zero-day vulnerability tracked as CVE-2022-37042 has been exploited since at least June to hack over 1,000 Zimbra email servers. [Read More]
SecurityWeek is publishing a digest summarizing some of the announcements made by vendors at Black Hat USA 2022. [Read More]
Intel’s Tunable Replica Circuit (TRC) adds fault injection detection technology to identify non-invasive physical glitch attacks and electromagnetic fault injections. [Read More]
A high-severity vulnerability in Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software could lead to the leak of an RSA private key. [Read More]
Potentially serious vulnerabilities have been found in a building management system made by Alerton, a brand of industrial giant Honeywell. [Read More]
An analysis has found that some commercial cybersecurity products rely on algorithms that were taken from other security tools and which they were not authorized to use. [Read More]
Security researchers with Bitdefender have identified multiple critical vulnerabilities in the Device42 asset management platform. [Read More]
Palo Alto Networks is working on patches for a reflected amplification denial-of-service (DoS) vulnerability in PAN-OS. [Read More]

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
By understanding how to identify, isolate, and remove unwanted bot and fraud traffic, enterprises can remove the noise clouding the visibility they have into their online applications.
Marc Solomon's picture
The goal of security automation is to accelerate detection and response, but you’ll waste a lot of time if you try to eat the elephant all at once.
Laurence Pitt's picture
A well-implemented ZTNA with the ‘trust-no-one, assume nothing’ mantra is also a great tool to mitigate potential attacks.
Marie Hattar's picture
For Smart Cities to truly live up to their promise, we shouldn’t forget that – like all infrastructure – safety and security are a top priority.
Joshua Goldfarb's picture
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.
Marc Solomon's picture
With an approach that is data-driven and flexible, you can get as simple or as advanced as the detection and response demands.
Derek Manky's picture
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Gordon Lawson's picture
The adoption of IoT technology used to connect SCADA systems to the internet either directly or indirectly dramatically increases the risk of a successful exploit.
Laurence Pitt's picture
It was great to be back in-person at security events, and I enjoyed meeting with people and discussing our solutions face-to-face.
Galina Antova's picture
Over the last few years, the pandemic and work from home paradigm shift have accelerated the convergence of IT and OT networks and necessitated a consolidated strategy to address cyber risks across cyber-physical systems (CPS).