Security Experts:

More Security Headlines

The latest browser iteration mitigates query parameter tracking when Enhanced Tracking Protection strict mode is enabled. [Read More]
With Basic Auth’s demise looming, federal agencies and private organizations alike should accelerate the adoption of Modern Auth, CISA says. [Read More]
MITRE has published the 2022 CWE top 25 most dangerous software weaknesses, based on an analysis of 38,000 CVEs from the previous two years. [Read More]
The new CISA-funded effort is aimed at blind and visually impaired students who want to pursue careers in cybersecurity. [Read More]
Normalyze closes a $22 million funding round as venture capitalists rush to place bets on the newly coined Data Security Posture Management (DSPM) space. [Read More]
Google expands Cloud Armor features with adaptive protection, bot defense, new edge security policies, rate limiting, and support for proxy load balancers. [Read More]
CISA says the Linux vulnerability tracked as CVE-2021-4034 and PwnKit has been exploited in attacks. [Read More]
Israeli startup Cyolo raises a massive Series B round to compete in the market for zero trust networking access. [Read More]
A Chinese threat actor has been conducting influence campaigns targeting rare earth mining companies in Australia, Canada, and the United States. [Read More]
Cloud security firm Wiz has announced the launch of an open database whose goal is to catalog vulnerabilities and other security issues affecting cloud services. [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
As automation continues to evolve, a new approach to accelerate detection and response is emerging based on data and business logic to automatically trigger simple actions that can be standalone or be chained together.
Jeff Orloff's picture
Cybersecurity teams must be much more inclusive in their hiring processes, if they want to hire the best people and have loyal staff.
Keith Ibarguen's picture
As email security is an ever-changing landscape, focusing on the most relevant issues in the threat landscape is where organizations need to start.
Marie Hattar's picture
As IoT adoption increases within healthcare, healthcare organizations and device manufacturers will need to prioritize the security of connected medical devices to keep patient data private and ensure the safety of the patient.
Marc Solomon's picture
Here are three challenges CISOs should prepare for as the ripple effects of the SEC amendments make their way through to board recruitment processes.
Joshua Goldfarb's picture
In addition to helping security teams recruit and retain the talent they need, employee wellness brings other benefits. Here are five ways in which wellness is good for security:
Galina Antova's picture
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
Gordon Lawson's picture
The surge of cyber attacks in 2021 was a wake-up call for consumers, who felt the firsthand effects that can result from a breach.
William Lin's picture
Most organizations want to adopt DevSecOps practices, but their current practices are closer to traditional waterfall methodologies than the agile practices described in this DevSecOps manifesto.
Derek Manky's picture
Linux is becoming a more popular target for attackers as it operates the back-end systems of many networks and container-based solutions for IoT devices and mission-critical applications.