Security Experts:

More Security Headlines

Twitter on Wednesday announced that it removed 130 accounts originating from Iran that were aimed at disrupting the first 2020 U.S. presidential debate. [Read More]
Microsoft has published a support article to provide guidance on what organizations need to do to ensure that they are not exposed to attacks targeting the Zerologon vulnerability. [Read More]
Data analytics firm Palantir, which has drawn fire over its law enforcement and national security work, made a low-key debut Wednesday on Wall Street at a hefty valuation of more than $20 billion. [Read More]
GitHub announces the general availability of Code Scanning, a feature that enables developers to easily identify vulnerabilities in their code. [Read More]
Enterprise application access provider Axis Security this week announced that it has raised $32 million in Series B funding, which brings the total raised by the company to $49 million. [Read More]
A U.S. district judge has dismissed New Mexico’s privacy claims against Google over privacy concerns, but New Mexico’s top prosecutor vowed Monday to continue the legal fight to protect child privacy rights. [Read More]
Cisco this week released patches for two high-severity vulnerabilities in IOS XR software that have been actively exploited in attacks for over a month. [Read More]
Twitter has appointed Rinki Sethi as its new CISO. Sethi previously held management positions at eBay, Intuit, Palo Alto Networks, Rubrik and IBM. [Read More]
A Russian national was sentenced to 88 months in prison in the United States for hacking LinkedIn, Dropbox, and Formspring in 2012. [Read More]
DDoS attacks against flight tracking services Plane Finder and Flightradar24 may be linked to the conflict between Armenia and Azerbaijan. [Read More]

SecurityWeek Experts

rss icon

Torsten George's picture
The risk of company employees walking away with sensitive data or selling their access credentials has never been greater now that a record number of individuals have been laid off.
Galina Antova's picture
The COVID-19 crisis and its associated constraints has shown us that many of the activities we considered “priorities” before March are not really priorities.
Idan Aharoni's picture
Speak with security professionals who are involved in monitoring the Dark Web and you will probably end up getting varied responses as to what it is and what it is comprised of.
Gunter Ollmann's picture
The phrase “assume breach” has been transformational to enterprise security investment and defensive strategy for a few years but may now be close to retirement.
Marc Solomon's picture
While it may be a trendy term, in cybersecurity, intelligence pivoting is pivotal to detection and response.
Joshua Goldfarb's picture
A healthy dose of self-doubt can go a long way towards keeping us on our toes and continually improving the security posture of our respective organizations.
Galina Antova's picture
As digital transformation and cybersecurity become pillars that successful companies will build their futures on, the time has come to include CISOs and CIOs on company boards.
Torsten George's picture
Vishing is a form of criminal phone fraud, combining one-on-one phone calls with custom phishing sites.
Idan Aharoni's picture
The term "Threat Intelligence" encompasses an ever-growing set of offerings that, on an operational standpoint, have different use cases.
Rafal Los's picture
If you're not allocating time to develop strong operational process - integrations and workflows - you're never going to solve the problem you're trying to solve.