Security Experts:

More Security Headlines

CISA has urged organizations to patch a recent Zimbra credential theft vulnerability after reports of exploitation in the wild. [Read More]
Evidence suggests that a recent disruptive cyberattack aimed at the Albanian government was conducted by Iranian threat actors. [Read More]
A critical vulnerability that can allow unauthenticated remote code execution affects hundreds of thousands of DrayTek Vigor routers. [Read More]
ZeroFox will begin trading on the Nasdaq Stock Market as a result of the previously announced deal by SPAC firm L&F Acquisition Corp. [Read More]
Critical vulnerabilities patched by Cisco in its small business routers can be exploited remotely for code execution and DoS attacks. [Read More]
Enterprise secure browser startup firm Talon Cyber Security has closed a $100 million Series A funding round led by Evolution Equity Partners. [Read More]
New York-based cyber readiness and risk management firm Axio has raised $23 million in a Series B funding round led by ISTARI. [Read More]
Major Taiwanese government websites were temporarily forced offline by cyber attacks believed to be linked to China and Russia during US House Speaker Nancy Pelosi's visit to the island. [Read More]
Data collected by VirusTotal shows that many legitimate websites deliver malware and malware increasingly mimics legitimate applications. [Read More]
RegScale scores $20 million in early-stage capital from SYN Ventures, SineWave Ventures, VIPC’s Virginia Venture Partners and SecureOctane. [Read More]

SecurityWeek Experts

rss icon

John Maddison's picture
Digital acceleration, user demand, and shifting business strategies add new edges to the network, making it increasingly difficult to manage and even harder to secure.
Jeff Orloff's picture
The Defense Readiness Index is a reliable alternative for assessing a security team’s skill level, developing a roadmap for improving cyber competencies, and reaching the optimal level of cyber security readiness.
Joshua Goldfarb's picture
We can learn a valuable lesson about better fraud decision-making from restaurant choosing scenarios.
Derek Manky's picture
Malware and targeted attacks on operating systems and firmware have become increasingly destructive in nature, and these more nefarious attack methods are rising in prevalence.
Landon Winkelvoss's picture
Fusion centers are able to converge cyber and physical security, close gaps in coverage, and scale security to protect facilities and hundreds of thousands of employees.
Galina Antova's picture
There are no easy solutions to close the operational technology (OT) cybersecurity talent gap, but here are few ideas to help you get started.
Torsten George's picture
Digital experience monitoring technology goes beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
Marc Solomon's picture
As automation continues to evolve, a new approach to accelerate detection and response is emerging based on data and business logic to automatically trigger simple actions that can be standalone or be chained together.
Jeff Orloff's picture
Cybersecurity teams must be much more inclusive in their hiring processes, if they want to hire the best people and have loyal staff.
Keith Ibarguen's picture
As email security is an ever-changing landscape, focusing on the most relevant issues in the threat landscape is where organizations need to start.