Security Experts:

More Security Headlines

Vulnerabilities discovered in some older Schneider Electric PowerLogic gateways can allow hackers to remotely take control of devices or disrupt them. [Read More]
The STEM Audio Table device was also found to be externally controllable without authentication. [Read More]
French court rules that Ikea had set up an elaborate system to illegally spy on hundreds of employees and job applicants over several years, using private detectives as well as police sources. [Read More]
Poland's parliament said it will hold a closed-door session Wednesday to discuss a wave of cyber attacks against the EU member that the government called "unprecedented". [Read More]
General Manager of the Microsoft Threat Intelligence Center (MSTIC) John Lambert recently keynoted the SecurityWeek threat-intelligence summit where he called for a more collaborative approach to information sharing in cybersecurity. [Read More]
Identity management provider Elisity closes Series A funding to help scale and meet demand for its cloud-delivered cybersecurity platform. [Read More]
A researcher has earned $30,000 via Facebook’s bug bounty program for an Instagram vulnerability that exposed private posts. [Read More]
The attack took place on June 1 and forced the company to shut down all of the affected servers and computers. [Read More]
A former government contractor who was given the longest federal prison sentence imposed for leaks to the news media has been released from prison to home confinement. [Read More]
The feature is meant to provide users with control over encryption keys and the service used to access them. [Read More]

SecurityWeek Experts

rss icon

Tim Bandos's picture
Before even thinking about approaching a vendor, talk at length about the project amongst yourselves. What problem are you trying to solve and how will you know when you’ve solved it?
Marie Hattar's picture
Security is never static, and networks will always be evolving, so make sure you’re continuously validating your security posture and ready for whatever comes next.
Idan Aharoni's picture
SPF, DMARC and DKIM are three email security methods that work together to prevent unauthorized third parties from sending emails on behalf of a domain.
John Maddison's picture
As enterprises adopt 5G networks and services to enable digital innovation across new network edges, they are also introducing new risks.
Marc Solomon's picture
As you determine what security technologies to invest in, develop not only a technology roadmap, but also include and align an operational roadmap.
Yaniv Vardi's picture
Adversaries are evolving their approaches and escalating attacks against industrial networks. They aren’t operating on our timelines, so we need to focus on what we can do next week and next month to reduce risk the most.
Laurence Pitt's picture
For many of us, RSA Conference 2020 in San Francisco was the last time we came together as a community, met with colleagues, and saw new technology offerings.
Rob Fry's picture
By taking some lessons from outside our cybersecurity sandbox, we can address some of the significant challenges in cybersecurity.
Landon Winkelvoss's picture
While cyber due diligence has yet to become commonplace in M&A transactions, the consequences of failing to identify risks and active campaigns can have costly implications.
William Lin's picture
The most common “new project” in identity nowadays is in Zero Trust. This concept has been evolving for years, and is building controls around an interesting premise: the idea that every resource will one day be internet-facing.