Security Experts:

More Security Headlines

Secure Access Service Edge (SASE) provider Cato Networks has raised $130 million in a Series E funding round led by Lightspeed Venture Partners. [Read More]
A threat group tracked as Stantinko was observed using a new version of a Linux proxy Trojan that poses as Apache servers to remain undetected. [Read More]
Home Depot agreed to a $17.5 million settlement with the attorney generals of 46 states and the District of Columbia over the massive data breach suffered by the home improvement retailer in 2014. [Read More]
Apple Chief Security Officer Thomas Moyer promised to give the Santa Clara County sheriff's office 200 iPads, worth about $70,000, in exchange for concealed weapons permits (CCW), the county's district attorney alleged in a statement Monday. [Read More]
Cybercriminals were able to change the DNS settings of some cryptocurrency websites after tricking GoDaddy employees into providing them with access to customer accounts. [Read More]
A Chinese threat actor tracked as Mustang Panda was observed using an updated arsenal of tools in recent attacks. [Read More]
Canonical has published hardened LTS container images on Docker Hub, promising up to 10 years of security maintenance. [Read More]
Telecom companies in Britain face hefty fines if they don’t comply with strict new security rules under a new law proposed in Parliament that is aimed at blocking high-risk equipment suppliers like China’s Huawei. [Read More]
The FBI this week issued an alert to warn the public of spoofed FBI-related Internet domains. [Read More]
VMware has published an advisory to inform users that it’s working on patching CVE-2020-4006, a critical command injection vulnerability affecting Workspace ONE Access. [Read More]

SecurityWeek Experts

rss icon

Torsten George's picture
Ultimately, organizations must assume that bad actors are already in their networks. And consumers must realize they’re constant targets.
Galina Antova's picture
In lock step with digital transformation projects, organizations are adopting the best practice of centralizing responsibility and accountability for securing the OT environment with the CISO.
AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Laurence Pitt's picture
To reap the benefits of 5G and ensure security, organizations must be smarter, fully educated and willing to work alongside the tech.
Marc Solomon's picture
When intelligence becomes a capability and not just subscriptions to feeds, we can gain the full value of intelligence as the foundation to security operations.
John Maddison's picture
SD-WAN connections are designed to constantly shift and adjust, replacing one connection that has become unstable with another without interrupting application performance.
Gunter Ollmann's picture
It is reasonable to assume that within five years the term “confidential compute” will become superfluous and an assumed native component of all cloud services.
Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Joshua Goldfarb's picture
I have noticed some common threads that run through both good and bad advice, particularly in the security field.
Derek Manky's picture
It’s amazing how foundational security principles, consistently implemented, can help defeat the craftiest attack vector.