Security Experts:

More Security Headlines

The Accellion service involved in the Reserve Bank of New Zealand breach is called FTA (File Transfer Application) and is used for file sharing. [Read More]
William Evanina, director of the U.S. National Counterintelligence and Security Center, said he expected to see a “growth” in the number of victims linked to the SolarWinds hack. [Read More]
Google, Twitter and Amazon are hopeful that Joe Biden's incoming administration in the United States will enact a federal digital data law, senior company officials said at CES, the annual electronics and technology show. [Read More]
The stolen documents were related to Pfizer and BioNTech’s COVID-19 vaccine candidate. [Read More]
SolarLeaks is offering to sell — for tens and even hundreds of thousands of dollars — files allegedly obtained as a result of the SolarWinds breach. [Read More]
WhatsApp on Tuesday reassured users about privacy at the Facebook-owned messaging service as people flocked to rivals Telegram and Signal following a tweak to its terms. [Read More]
The Rogue malware can exfiltrate user data from Android devices and install additional payloads. [Read More]
Mimecast learned from Microsoft that one of its certificates was compromised by sophisticated threat actors, but the email security firm says impact is limited. [Read More]
A watchdog agency for the U.S. Census Bureau says that proper information-technology security safeguards weren’t in place leading up to the start of the 2020 census. [Read More]
German software maker SAP has published 10 bulletins with fixes for a range of serious security vulnerabilities. [Read More]

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
Facts, data, and evidence are extremely important to properly detecting, preventing, and investigating both security incidents and fraud incidents.
Galina Antova's picture
Security teams need to able to identify and track threats that cross the IT/OT boundary, which means having access to IT/OT threat signatures for the ICS networks as well.
Laurence Pitt's picture
Many security teams will have to reduce budget against projects scheduled for 2021, with funds being re-allocated to pandemic-related business and workforce enablement
Marc Solomon's picture
Curated threat intelligence is an essential capability of the SOC, enabling tools and teams to work more efficiently and effectively to optimize everything from incident response to threat hunting.
Preston Hogue's picture
There is a dawning realization of the potential danger posed by algorithms, written by humans to steer other humans.
Derek Manky's picture
With the pandemic creating a massive remote work shift and consequent rises in cyber risk, finding individuals with cybersecurity skills is harder than ever.
Joshua Goldfarb's picture
Playing whack-a-mole with malicious code infections, phishing sites, and compromised credentials won’t help an enterprise reduce losses due to fraud.
Tim Bandos's picture
Keeping a ‘six foot distance’ between our digital home life and digital work life can go a long way when it comes to safeguarding our most sensitive data, too.
Torsten George's picture
Ultimately, organizations must assume that bad actors are already in their networks. And consumers must realize they’re constant targets.
Galina Antova's picture
In lock step with digital transformation projects, organizations are adopting the best practice of centralizing responsibility and accountability for securing the OT environment with the CISO.