Security Experts:

More Security Headlines

ESET launches new enterprise security solutions, including EDR, forensic investigation, threat monitoring, sandbox and management tools [Read More]
Threat actors can disrupt a power grid’s normal operation using a botnet of tens of thousands of compromised high-wattage IoT devices such as air conditioners and heaters [Read More]
U.S. President Donald Trump signed the NIST Small Business Cybersecurity Act, S. 770 into law on Tuesday, August 14, 2018. [Read More]
Google is prepared to pay up to $5,000 for bug reports describing techniques that can be used to bypass the company’s abuse-detection systems [Read More]
The FBI is keenly aware of the dangers that cyber-criminals pose to Mississippi River-related businesses and infrastructure. [Read More]
SAP’s security updates for August 2018 include over two dozen patches, but none of them are for critical vulnerabilities [Read More]
Twistlock, a provider of solutions to protect cloud containers, has raised $33 million in Series C funding, bringing the total raised to-date by the company to $63 million. [Read More]
What you need to know about the Foreshadow / L1TF vulnerabilities affecting Intel CPUs, including impact and affected vendor responses [Read More]
Microsoft patches 60 vulnerabilities, including two zero-day flaws affecting Windows and Internet Explorer [Read More]
Tech companies could face fines of up to AUD$10 million (US $7.3 million) if they fail to hand over customer information or data to Australian police under tough cyber laws unveiled Tuesday. [Read More]

SecurityWeek Experts

rss icon

Stan Engelbrecht's picture
If you know you want to improve your security operations, but don’t know where to start, here are a few steps that can help get you ready for a security orchestration, automation, and response (SOAR) platform.
Erin O’Malley's picture
Like big game hunting, cyber threat hunting is not easy and requires a unique mix of hard-earned skills and intelligence.
Torsten George's picture
The Reddit data breach illustrates the importance of rolling out an approach designed to verify the user, validate their device, limit access and privilege, and learn and adapt to new risks.
Jalal Bouhdada's picture
Wireless IIoT solutions are fast to deploy, but companies must gauge whether they are an appropriate solution based on a number of different factors.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Alastair Paterson's picture
A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource Planning (ERP) applications at risk of cyber attacks.
Laurence Pitt's picture
People are becoming complacent and ignoring the basic lessons we learned decades ago. Technology has advanced immensely since 1990 when the term “cybersecurity” arrived on the scene.
Preston Hogue's picture
To combat today’s constantly innovative information warfare, CISOs need diversity on their teams, because everyone has their expertise, but also their blind spots.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.
Mike Fleck's picture
Big companies can say they are GFPR compliant, but odds are their current structure will never allow them to find, identify, and categorize all the data that they have collected over time.