Security Experts:

More Security Headlines

IcedID banking trojan operators send messages using contact forms in an attempt to trick victims into downloading malicious attachments. [Read More]
Israeli spy agencies accused Iran of using fake social media accounts to lure citizens of the Jewish state abroad "to harm or abduct them". [Read More]
Security startup Randori releases Target Temptation to help pinpoint the ‘attackability’ of the assets in an enterprise network. [Read More]
Veriff, a provider of automated identity verification technology, has secured $69 million in Series B financing, bringing the total amount raised by the company to $92.8 million. [Read More]
President Joe Biden has selected former senior NSA officials, Chris Inglis and Jen Easterly, for key cyber roles in his administration, the White House said. [Read More]
Iran blamed Israel on Monday for a sabotage attack on its underground Natanz nuclear facility that damaged its centrifuges, an assault that imperils ongoing talks over Tehran’s tattered nuclear deal and brings a shadow war between the two countries into the light. [Read More]
Eleven cybersecurity-related acquisitions and mergers were announced April 1-11, 2021. [Read More]
Federal Reserve chairman Jerome Powell said he was more worried about the risk of a large-scale cyberattack than another financial crisis like that of 2008. [Read More]
Exploit acquisition company Zerodium is temporarily offering $300,000 for WordPress RCE exploits, three times the regular amount. [Read More]
Iran's Natanz uranium enrichment facility lost power Sunday, April 11, 2021, just hours after starting up new advanced centrifuges capable of enriching uranium faster. [Read More]

SecurityWeek Experts

rss icon

Gunter Ollmann's picture
Once live stomping around vendor-packed expo halls at security conferences returns, it is highly probable that “Virtual Analyst” will play a starring role in buzzword bingo.
William Lin's picture
“What’s hot right now in security?” is one of the most common questions I hear from CISOs, vendors and VCs alike.
Yaniv Vardi's picture
As industrial cybersecurity rises to the top of priority lists for CISOs and their boards, we have an opportunity to think differently about industrial operations protection.
Marc Solomon's picture
To gain a comprehensive understanding of the threats you are facing and what you must defend, you need to start by aggregating internal data from across the entire ecosystem
Joshua Goldfarb's picture
Josh Goldfarb debunks the most common myths surrounding fraud, security and user experience.
Derek Manky's picture
Each side of the public-private collaboration has resources and capabilities that shore up the other and increase effectiveness in combatting cybercrime.
Torsten George's picture
Cyber resilience can be considered a preventive measure to counteract human error, malicious actions, and decayed, insecure software.
Tim Bandos's picture
The ransomware threat could still become more pervasive over the next two to three years, not because ransomware is effective in and of itself but because of other players in the game continue to fan the flames.
John Maddison's picture
Security tools, regardless of where they have been deployed, need to be able leverage common security intelligence feeds and share alerts and threat data with other security tools.
Yaniv Vardi's picture
Supply chain cyber risk is complicated and spans the entire lifecycle of a product—across design, manufacturing, distribution, storage, and maintenance.