Security Experts:

More Security Headlines

Watch the interview with Steve Katz, the first ever Chief Information Security Officer, to hear how security leaders can make it OK to click, and how that makes a difference for employees and organizations alike. [Read More]
Kasada has closed a $23 million Series C funding round led by StepStone Group. [Read More]
Security problems at enterprise software provider Zoho multiply with confirmation of a new critical authentication bypass vulnerability -- the third in four months -- being exploited in the wild. [Read More]
Distributed through the Hancitor malware loader, Cuba ransomware has compromised at least 49 targets in 5 sectors. [Read More]
Researchers have developed a tool that checks web browsers for cross-site leaks, and they have identified 14 new types of XS-Leak attacks. [Read More]
The cryptocurrency trading platform says the attackers compromised its Ethereum (ETH) and Binance Smart Chain (BSC) hot wallets. [Read More]
An electric utility in Colorado has disclosed an apparent ransomware attack that resulted in 90% of its internal IT functions getting disrupted and the loss of data from the last 20 years. [Read More]
Israeli spyware maker NSO Group is investigating reports that its technology was used to target iPhones of some US diplomats in Africa. [Read More]
Researchers flag hundreds of security flaws in routers from Asus, AVM, D-Link, Edimax, Linksys, Netgear, Synology and TP Link. [Read More]
Two Iranian nationals have been charged in Missouri for running a cryptojacking operation after a local tech company received a $760,000 bill for cloud services. [Read More]

SecurityWeek Experts

rss icon

Torsten George's picture
Before the next Cybersecurity Awareness Month comes along, companies across all industries should consider moving to a Zero Trust approach, powered by additional security measures such as MFA and endpoint resilience.
Marc Solomon's picture
If you are among the growing group of organizations looking to an MDR provider to supplement your security operations with XDR, make sure you consider these three factors.
Landon Winkelvoss's picture
Conducting scaled and cost-effective attack surface and digital threat monitoring gives organizations of all sizes the best chance of identifying and defeating their adversaries.
Joshua Goldfarb's picture
By understanding what makes a great security practitioner, organizations can learn how to recruit and retain effective security practitioners.
William Lin's picture
While there still isn’t a clear industry-accepted answer to Vendor risk management (VRM), there has been more interest in staying on top of and learning about the latest in this space.
Keith Ibarguen's picture
Leverage the power of the collective - the network effect – for its ever-evolving intelligence wherever possible to keep your employees free of all the bad stuff that has made it to their inboxes.
Gordon Lawson's picture
Most cyber insurance providers are demanding that companies supply proof of their backup implementation in order to obtain an affordable policy.
Derek Manky's picture
Botnets are becoming more malicious, sometimes able to create hundreds of thousands of drones that can attack a variety of machines, including Mac systems, Linux, Windows systems, edge devices, IoT devices, and so on.
Marc Solomon's picture
The goal of XDR is detection and response across the infrastructure, across all attack vectors, across different vendors, and across security technologies that are cloud based and on premises.
John Maddison's picture
Zero-trust network access (ZTNA) simplifies secure connectivity by providing seamless, per-use access to applications, no matter where the user or application may be located.