Security Experts:

More Security Headlines

American packaging giant WestRock has disclosed a ransomware incident that impacted both IT and OT systems. [Read More]
An attacker could relay NTLM authentication sessions and execute code remotely using a printer spooler MSRPC interface. [Read More]
The elite Russian hackers who gained access to computer systems of federal agencies last year didn’t bother trying to break one by one into the networks of each department. [Read More]
Industrial organizations have been informed about the existence of several potentially serious vulnerabilities affecting a Matrikon (Honeywell) OPC UA product. [Read More]
Researchers discovered an unsecured Elasticsearch server exposing more than 323,277 Cook County court related records containing highly sensitive personal data. [Read More]
Intel blamed an internal error for a data leak that prompted it to release a quarterly earnings report early. [Read More]
SonicWall says its internal systems have been targeted by sophisticated hackers as part of a coordinated attack that may have involved exploitation of zero-day vulnerabilities in its own products. [Read More]
With Microsoft Edge 88.0.705.50, users get a built-in strong password generator that allows them to easily set up new passwords when signing up for new accounts or when changing the old passwords. [Read More]
President Joe Biden has instructed U.S. intelligence agencies to provide him with a detailed assessment of the SolarWinds hack. [Read More]
Intel released information about its Q4 earnings earlier than planned after learning that hackers possibly gained unauthorized access to sensitive financial information. [Read More]

SecurityWeek Experts

rss icon

AJ Nash's picture
For companies trying to build new or mature existing intelligence programs, the Age of COVID has been an excellent time to capture 30-60 minutes with that hard-to-find manager
Yaniv Vardi's picture
The change we encountered in 2020 was unprecedented and had a dramatic impact on our operational technology (OT) environments – accelerating and sometimes recasting how we address the following four key areas.
Marc Solomon's picture
To push security operations forward, we must move towards a single, collaborative environment that can include threat hunters, incident handlers and threat intelligence and SOC analysts.
Joshua Goldfarb's picture
For any fraud detection solution to be practical, it must be easily integrated into security and fraud operations.
Laurence Pitt's picture
In the world of information security, it’s hard to flip between internet browser tabs without hearing a new term, and one of the biggest in 2020 was Secure Access Service Edge (SASE).
Torsten George's picture
While the SolarWinds hack is not the first supply chain attack to make headlines, its sophistication and blast radius is forcing organizations to consider how they can minimize their exposure to these types of threats in the future.
AJ Nash's picture
As you build your cyber intelligence program – and have all the vendors lined up to take your money – don’t overlook the importance of investing in the right people.
Gunter Ollmann's picture
CISOs and their security teams need to quickly master these technologies if they’re to successfully partner with in-house development teams and secure “data-in-use.”
Derek Manky's picture
2020 has taught us to revisit the practice of inspecting encrypted traffic. These are all standard security protocols to step up in light of what cybercriminals are doing now.
John Maddison's picture
Multi-vendor environments with disparate security solutions that don’t integrate when deployed make it impossible for organizations to securely use the flexible network environments they need to compete effectively.