Security Experts:

More Security Headlines

Documents related to the Pfizer coronavirus vaccine were illegally accessed during a cyberattack at the EU regulator, the company said. [Read More]
Cybersecurity agencies around the world have issued advisories and alerts for a recently disclosed DoS vulnerability affecting OpenSSL, and vendors have started assessing the impact of the flaw on their products. [Read More]
Secretary of State Mike Pompeo accused U.S. universities of caving to Chinese pressure to blunt or bar criticism of the Chinese Communist Party. [Read More]
Google confirmed it is banning location tracking software developed by data collection firm X-Mode Social from apps on Android-powered mobile devices. [Read More]
A Russian citizen living in Denmark has been charged with espionage for allegedly having provided information about Danish energy technology, [Read More]
OpenSSF announces an open source tool designed for evaluating the ability of static analysis security testing (SAST) products to detect vulnerabilities. [Read More]
A late October cyberattack on the computer systems of the University of Vermont Medical Center is costing the hospital about $1.5 million a day in lost revenue and recovery costs, its CEO said. [Read More]
The EU's medicines regulator targeted in cyberattack, just weeks before it is due to decide on special approval for two coronavirus vaccines. [Read More]
Cloud security startup Wiz emerges from stealth mode with $100 million in Series A funding. [Read More]
A total of 46 vulnerabilities patched with the release of the December 2020 security updates for Android. [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
Curated threat intelligence is an essential capability of the SOC, enabling tools and teams to work more efficiently and effectively to optimize everything from incident response to threat hunting.
Preston Hogue's picture
There is a dawning realization of the potential danger posed by algorithms, written by humans to steer other humans.
Derek Manky's picture
With the pandemic creating a massive remote work shift and consequent rises in cyber risk, finding individuals with cybersecurity skills is harder than ever.
Joshua Goldfarb's picture
Playing whack-a-mole with malicious code infections, phishing sites, and compromised credentials won’t help an enterprise reduce losses due to fraud.
Tim Bandos's picture
Keeping a ‘six foot distance’ between our digital home life and digital work life can go a long way when it comes to safeguarding our most sensitive data, too.
Torsten George's picture
Ultimately, organizations must assume that bad actors are already in their networks. And consumers must realize they’re constant targets.
Galina Antova's picture
In lock step with digital transformation projects, organizations are adopting the best practice of centralizing responsibility and accountability for securing the OT environment with the CISO.
AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Laurence Pitt's picture
To reap the benefits of 5G and ensure security, organizations must be smarter, fully educated and willing to work alongside the tech.
Marc Solomon's picture
When intelligence becomes a capability and not just subscriptions to feeds, we can gain the full value of intelligence as the foundation to security operations.