Security Experts:

More Security Headlines

Fireblocks, a blockchain security provider, has emerged from stealth after closing a $16 million Series A funding round from Cyberstarts, Tenaya Capital, Eight Roads (investment arm of Fidelity), Swisscom Ventures and MState. [Read More]
Rapid7 has analyzed the visible cyber exposure of some of the UK's largest companies -- the FTSE 250. [Read More]
Israel-based cloud visibility solutions provider Orca Security emerges from stealth mode with $6.5 million in seed funding. [Read More]
Two U.S. senators asked the FBI on Wednesday to explain what it has done to investigate the suspected hack by Russian intelligence of a Florida-based voting software company before the 2016 election. [Read More]
Encrypted messaging service Telegram suffered a major cyber-attack that appeared to originate from China, the company's CEO said Thursday, linking it to the ongoing political unrest in Hong Kong. [Read More]
Microsoft released security patches for nearly 90 vulnerabilities, including two Critical bugs impacting the proprietary authentication protocol NTLM. [Read More]
Email-focused cybersecurity firm Vade Secure has agreed to a €70 million (approximately US$79.3 million) investment by venture capital firm General Catalyst. [Read More]
Following four years of self-funded fine-tuning in Europe, start-up security awareness firm CybeReady has expanded into the U.S. market with an initial funding round of $5 million led by Baseline Ventures. [Read More]
A critical vulnerability found in a popular Evernote extension for Chrome can be exploited to steal sensitive data from the websites accessed by a user. [Read More]
Security awareness training firm KnowBe4 has taken a $300 million investment led by private equity giant KKR. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
Despite all of the money pumped into security on an annual basis, many of the same issues and challenges persist from year to year.
Preston Hogue's picture
If done right and integrated throughout the process, security ends up being not a source of friction, but a function that protects the business, at the speed of business.
Marc Solomon's picture
Marc Solomon reviews the list of five characteristics to see how Gartner defined an intelligence-driven SOC four years ago and compare that list to where we are today.
Torsten George's picture
Using Zero Trust Privilege services can extend corporate security policies and best practices to cloud environments, while reducing costs, improving scalability across multi-VPCs, -SaaS, and -directory environments, and minimizing security blind spots through centralized management.
Ashley Arbuckle's picture
Even if SMBs don’t have the resources for a comprehensive security assessment and possible overhaul, incremental change is better than none.
Laurence Pitt's picture
In the coming years the data protection and privacy landscape will change dramatically, improving the experience for us as individuals but potentially making things more complex for businesses.
Gunter Ollmann's picture
CISOs should invest time in applying the resources of public cloud to bring automation, scalability, and AI to solving the given problem as a platform for all customers – past, present, and future.
Jalal Bouhdada's picture
By deploying robots with cybersecurity in mind we can ensure that they don’t run the danger of introducing the same negative effects into their environment.
Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.
Seema Haji's picture
Failing to implement the right security controls could open the door for attacks and disruption that threatens system availability and performance — the very reasons for leveraging the power of IoT in the first place.