Security Experts:

More Security Headlines

A European subsidiary of Japanese firm giant Toshiba was hit by a ransomware attack at the hands of the DarkSide ransomware syndicate [Read More]
The company says it has no evidence that potentially compromised data is being shared on the Dark Web. [Read More]
Cisco has agreed to acquire Kenna Security, a privately held cybersecurity company focused on vulnerability management technology. [Read More]
Industry professionals comment on the executive order signed by President Joe Biden to strengthen the US’s cybersecurity defenses. [Read More]
The Washington DC police department suffered a massive leak of internal information after refusing to meet the blackmail demands of Russian-speaking ransomware syndicate. Experts say it’s the worst known ransomware attack ever to hit a U.S. police department. [Read More]
Colonial Pipeline reportedly paid a $5 million ransom to Darkside ransomware operators, but still used backups to restore systems as the tool provided by the hackers was too slow. [Read More]
Ireland’s health service shut down its IT systems on Friday after being targeted in what it called a “significant ransomware attack.” [Read More]
Researchers find and document a way to leverage Apple’s Find My's Offline Finding network to upload arbitrary data to the Internet. [Read More]
Enterprise security vendor Rapid7 says unauthorized third-party accessed source code, customer data during Codecov supply chain breach [Read More]
Gartner believes it will be four years before the market achieves two-thirds of the position a WSJ Intelligence and Forcepoint survey says is already achieved on deployment of secure access service edge (SASE). [Read More]

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
Josh Goldfarb analyzes five statements stubborn people often say, discusses how they harm an organization's security posture, and suggests ways forward in each case.
Marc Solomon's picture
For efficiency and effectiveness, automation must take a data-driven approach and encompass how we initiate and learn from the response, not just how we execute the process.
Tim Bandos's picture
Shifting to the cloud can be a radical but necessary change. There’s no denying the transition can be time consuming and costly upfront.
Gordon Lawson's picture
While obscurity is an offensive tool for attackers, it also represents a defensive measure for organizations. Let’s consider the benefits of concealing network infrastructure and activity from the outside world to reduce the enterprise attack surface.
Landon Winkelvoss's picture
In response to a specific attack, it’s important to do external threat monitoring and threat actor engagement to determine if the actors are attempting to exploit or monetize the security event.
William Lin's picture
The combination of “shifting left” and “cloud security” is going to happen and be called “shifting everywhere.”
Rob Fry's picture
Each year we see more vendors with technology solutions and buzzwords that rarely live up to their hype and customers willing to believe or gamble for the chance at more visibility, lower business risk, or the chance to close a security gap.
Idan Aharoni's picture
Fraudsters will determine who to target within the industry based on each service’s fraud prevention policies and maturity, rather than generally targeting the industry.
John Maddison's picture
The best defense in depth strategy is one that enables multiple tools, deployed across the distributed network—including endpoints, clouds, and applications—to work as a unified solution to detect and respond to threats.
Torsten George's picture
Despite the long-standing belief that deploying more security solutions will result in greater protection against threats, the truth of the matter can be very different.