Security Experts:

More Security Headlines

The maker of a 'smart' male chastity device has recommended using a screwdriver to break them open after warnings they can be locked remotely by hackers. [Read More]
Organizations using the Playback Now conference platform have been targeted by cybercriminals with a payment card skimmer. [Read More]
Two security researchers explain how they were able to hack into the command and control (C&C) panels of 10 IoT botnets. [Read More]
Microsoft has warned users of a new and sophisticated Android ransomware that abuses notification services to display the ransom note. [Read More]
A computer hacker who gave the Islamic State group personal data of more than 1,300 U.S. government and military personnel will remain in a federal prison after a judge rejected his request for compassionate release. [Read More]
Cloud security company Accurics raised $20 million across seed and Series A funding rounds in the past six months. [Read More]
New additions to Juniper's portfolio are designed to provide that visibility and control by bringing security to every point of connection and allowing CISOs to know who and what is on the network. [Read More]
The United States this week announced that it seized a total of 92 domain names that an Iran-linked adversary was leveraging in a global disinformation campaign. [Read More]
A previously unknown threat actor linked to Russia has been targeting Russian industrial organizations in an espionage campaign. [Read More]
Google this week revealed that it’s working on redesigning the security alerts for Google Accounts and that it will make them available directly in the applications users are logged into. [Read More]

SecurityWeek Experts

rss icon

Preston Hogue's picture
Everywhere you go, you cast a shadow of data that, taken together, reveals who you are, what you like to do, your habits, your addictions.
John Maddison's picture
By understanding the latest threat trends, security teams can take measures to ensure that their security strategies, including the identification and tracking of new IOCs, are being correctly updated.
Torsten George's picture
The risk of company employees walking away with sensitive data or selling their access credentials has never been greater now that a record number of individuals have been laid off.
Galina Antova's picture
The COVID-19 crisis and its associated constraints has shown us that many of the activities we considered “priorities” before March are not really priorities.
Idan Aharoni's picture
Speak with security professionals who are involved in monitoring the Dark Web and you will probably end up getting varied responses as to what it is and what it is comprised of.
Gunter Ollmann's picture
The phrase “assume breach” has been transformational to enterprise security investment and defensive strategy for a few years but may now be close to retirement.
Marc Solomon's picture
While it may be a trendy term, in cybersecurity, intelligence pivoting is pivotal to detection and response.
Joshua Goldfarb's picture
A healthy dose of self-doubt can go a long way towards keeping us on our toes and continually improving the security posture of our respective organizations.
Galina Antova's picture
As digital transformation and cybersecurity become pillars that successful companies will build their futures on, the time has come to include CISOs and CIOs on company boards.
Torsten George's picture
Vishing is a form of criminal phone fraud, combining one-on-one phone calls with custom phishing sites.