Security Experts:

More Security Headlines

New Microsoft service helps enterprise customers keep Windows and Office products automatically updated. [Read More]
SharkBot can steal user credentials and initiate unauthorized money transfers. [Read More]
Facebook said Russian state actors and others are relentlessly trying to use the social network against the Ukraine with deception, hacking and coordinated bullying campaigns. [Read More]
Nudge Security, an early stage startup promising to help organizations manage cybersecurity decisions, has emerged from stealth with a $7 million seed round. [Read More]
Google has teamed up with GitHub to improve software supply chain security with tamper-proof builds. [Read More]
Lithuania-based Nord Security has raised $100 million in its first ever outside capital funding, which values the company at $1.6 billion. [Read More]
India says it foiled an cyberattack by Chinese hackers targeting its power distribution system near a disputed frontier where the two countries are engaged in a military stand-off. [Read More]
A data theft tool used by the BlackCat (ALPHV) ransomware group shows the cybercriminals are increasingly interested in industrial organizations. [Read More]
Zoom says it paid out more than 2.4 million in rewards as part of its bug bounty program, which has been running on HackerOne since 2019. [Read More]
The vulnerabilities can be exploited by remote attackers to execute arbitrary code. [Read More]

SecurityWeek Experts

rss icon

Gordon Lawson's picture
Obfuscation technology creates a path to data and applications residing in commercial clouds that cannot be traced, and can be helpful for healthcare data security
Marc Solomon's picture
XDR architecture must be broad and deep so that organizations can get the most value out of their existing best-of-breed security solutions, including their free, open-source tools.
Torsten George's picture
Cyber resilience is the only way to guarantee true Zero Trust. When implemented properly, resilient Zero Trust becomes a preventive measure that counteracts human error, malicious actions, and decayed, insecure software.
Joshua Goldfarb's picture
While attackers and fraudsters are continually adapting and evolving, there are some measures that businesses can take to improve their fraud programs
Marie Hattar's picture
No matter how far you stray from having a perfect system — or how close you come to attaining one — the pursuit is always an essential and worthwhile investment of your time.
Landon Winkelvoss's picture
Many think open source intelligence is just another name for better googling. They are wrong. Good open source and threat intelligence are derived from three core capabilities.
Keith Ibarguen's picture
Vendor agnostic technology, married with actionable, globally-sourced, and continually evolving intelligence, augmented by humans, is needed to defend our enterprises.
John Maddison's picture
Zero Trust is not simply a product. If someone says it is, they probably either don't know what they're talking about or have watered down their marketing to the point of making it misleading.
Laurence Pitt's picture
There are areas where governments can learn from the private sector and vice-versa, which will help both sides adapt more quickly and effectively to a continuously evolving threat environment.
Galina Antova's picture
We must encourage the growth of research communities to help strengthen industrial cybersecurity, and we need to act fast.