Security Experts:

More Security Headlines

Hackers could deliver malware to a macOS system using an Office document containing macro code, simply by getting the victim to open the document. [Read More]
Lafayette, Colorado, officials announced Tuesday the city’s computer systems were hacked and they were forced to pay a ransom to regain access. [Read More]
Vulnerabilities found in protocol gateway devices can allow hackers targeting industrial systems to launch stealthy attacks. [Read More]
State and local officials are receiving additional tools from the federal government to help defend the nation’s election systems from cyberthreats ahead of the November vote. [Read More]
Researchers analyzed DJI’s Pilot app for Android and found some security issues, but the Chinese drone giant says the claims are “misleading.” [Read More]
Researchers have described how a botnet powered by high-wattage IoT devices can manipulate the energy market. [Read More]
GreyNoise Intelligence, a startup focused on helping security teams reduce alert fatigue, has raised $4.8 million in seed investment to help the company expand its intelligence service that helps teams “prioritize alerts that matter by quieting ones that don’t.” [Read More]
A Florida teen identified as the mastermind of a scheme that gained control of Twitter accounts of prominent politicians, celebrities and technology moguls pleaded not guilty on Tuesday to multiple counts of fraud. [Read More]
Google has patched over 50 vulnerabilities in the Android operating system with the August 2020 security updates. [Read More]
Microsoft says it has paid out nearly $14 million through its bug bounty programs in the past year, with the highest rewards paid out for Hyper-V vulnerabilities. [Read More]

SecurityWeek Experts

rss icon

Torsten George's picture
Ransomware is just one of many tactics, techniques, and procedures (TTPs) that threat actors are using to attack organizations by compromising remote user devices.
Idan Aharoni's picture
The threat intelligence space is filled with great vendors who can provide organizations with a lot of value in helping them protect their brand, employees and customers.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.
Galina Antova's picture
With the right tools in place, IT and OT teams can work together, leveraging visibility and continuity across the attack surface to govern OT networks with the same processes and reporting metrics.
John Maddison's picture
By combining verifiable trust, intent-based segmentation, and integrated security, organizations can establish a trustworthy, security-driven networking strategy.
Jim Ducharme's picture
Let’s look at some real-world examples of the identity management challenges remote work is creating, and at what it means to rethink identity governance and lifecycle to meet those challenges.
Marc Solomon's picture
As we look to the remainder of 2020 and where we should focus our attention, I encourage security leaders to take advantage of one of the few silver linings of the pandemic.
Laurence Pitt's picture
Developing an ROI model takes time – my recommendation would be to focus on a simple security project that will return high value to the business when proven successful.
Torsten George's picture
The integration of identity with security is still work in progress, with less than half of businesses having fully implemented key identity-related access controls according to a research study.
Galina Antova's picture
It’s very challenging for OT professionals to play catch up and close the 25+ year IT-OT security gap, particularly as the number of connectivity points grows exponentially.