Security Experts:

More Security Headlines

Supply chain cyberattacks are not a new idea, but have been taken to new levels of sophistication and frequency in recent years. This growth will continue through 2022 and beyond. [Read More]
Cybersecurity startup Permiso has emerged from stealth with $10 million in funding to identify and track human, machine, vendor and service provider identities in IaaS and PaaS infrastructures. [Read More]
Chronicle’s VirusTotal contains likely millions of user credentials readily available to anyone who knows where and how to look. [Read More]
Israeli lawmakers on called for a parliamentary inquiry into the police’s alleged use of sophisticated spyware on Israeli citizens, including protesters opposed to former Prime Minister Benjamin Netanyahu. [Read More]
Zoho fixes a critical authentication bypass vulnerability (CVE-2021-44757) in ManageEngine Desktop Central and Desktop Central MSP. [Read More]
The sudden move by Russia's top law enforcement agency to conduct a very public takedown of the REvil ransomware operation has set tongues wagging about how diplomacy may hold the key to slowing big-game ransomware attacks. [Read More]
VPNLab, a VPN service often used by cybercriminals, has been shut down as a result of an international law enforcement operation. [Read More]
The deal would resolve claims against the enterprise content firewall provider, now rebranded as Kiteworks. [Read More]
Major ICS vendors and other organizations have been targeted in an ongoing cyberespionage campaign that appears to focus on renewable energy. [Read More]
The World Economic Forum's Global Cybersecurity Outlook 2022 is somewhat disappointing given WEF’s resources. [Read More]

SecurityWeek Experts

rss icon

Torsten George's picture
Cyber resiliency measures (i.e., architectural design, technologies, operational practices) assume that today’s threat actors can achieve a foothold in an organization’s infrastructure and in turn post-exploit activities must be contained and eliminated.
Galina Antova's picture
What can defenders do in this new reality to strengthen the security posture of their OT environments? Here are five recommendations every CISO should consider.
Landon Winkelvoss's picture
The security industry must commit to a risk-based approach that understands the specific attacks and actors targeting their industry and profile.
Jeff Orloff's picture
To sharpen and learn cybersecurity skills, security professionals need to ‘play’ in a safe, yet stimulating place that provides hands-on, interactive upskilling.
Derek Manky's picture
Public and private entities need to collaborate by sharing threat information and attack data to make attacks more difficult and resource-intensive for cybercriminals.
Yaniv Vardi's picture
Critical infrastructure companies need to think of cybersecurity holistically, enabled by a single SOC to protect these once-separate environments in a holistic manner.
Marie Hattar's picture
It is a good idea to assume that your network has already been breached, even if no overtly malicious notifications have surfaced.
John Maddison's picture
Security must be as agile as today's workforce, ensuring consistent protection and optimal user experience regardless of where a user or device operates.
Marc Solomon's picture
You risk limiting the value you can derive from your next security investment without first thinking about your top use cases and the capabilities needed to address them.
Joshua Goldfarb's picture
Regardless of how often someone resigns, departure emails do bring to light a common problem in the cybersecurity field. There is, however, another side to departure emails that many of us don’t consider.