Security Experts:

More Security Headlines

The Pentagon is adopting new ethical principles as it prepares to accelerate its use of artificial intelligence technology on the battlefield. [Read More]
SecurityWeek's daily digest summarizing some of the product and service announcements made on Day 1 (Monday) of the 2020 RSA Conference. [Read More]
Vulnerabilities found by Cisco researchers in an industrial networking device made by Moxa can expose industrial environments to attacks. [Read More]
A new report suggests that poorly protected device identities could cost U.S. business between $15 billion and $21 billion. [Read More]
Canada's privacy watchdog on Friday announced an investigation into a US software startup reportedly capable of matching images of unknown faces to photos it mined from millions of websites and social media networks. [Read More]
Electronics protection company Slickwraps has revealed that user data was compromised recently after a third party accessed an unprotected database left accessible from the Internet. [Read More]
Cisco launches SecureX, a cloud-native security platform designed to improve visibility, deliver analytics, and automate common security workflows. [Read More]
Researchers discovered that Honeywell’s Notifier fire alarm systems are affected by two serious vulnerabilities that can be exploited to hack the system. [Read More]
The FBI on Friday arrested a man linked to former U.S. Rep. Katie Hill’s 2018 House campaign for allegedly orchestrating a series of cyberattacks on a rival candidate that shut down the campaign’s website for 21 hours. [Read More]
Just weeks into this year’s election cycle, Russia already is actively interfering in the U.S. presidential campaign in hopes of reelecting President Donald Trump, and is also trying to help the candidacy of Sen. Bernie Sanders on the Democratic side. [Read More]

SecurityWeek Experts

rss icon

Gunter Ollmann's picture
CISOs are increasingly cognizant of the value deep integration of threat intelligence can bring to cloud protection platforms and bottom-line operational budgets.
AJ Nash's picture
Once we shed the shackles of “cyber” and “threat,” we free our teams to consider a full spectrum of intelligence, including support to physical security, insider threats, procurement, mergers and acquisitions, and executive decision-making.
Marc Solomon's picture
As a security professional you have several corrective measures available so you can efficiently and effectively make sense of massive volumes of data, understand what to work on next and know the right actions to take.
Torsten George's picture
Perimeter-based security, which focuses on securing endpoints, firewalls, and networks, provides no protection against identity- and credential-based threats.
Preston Hogue's picture
Retailers should ensure that they are proactively scanning for vulnerabilities in the website, as well as deploying a solution to monitor traffic.
Craig Harber's picture
Deep visibility allows organizations to see how different pieces of the overall cyber terrain are communicating with one another, enabling them to highlight potential or existing attack vectors.
Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.
Fred Kneip's picture
While some forward-thinking companies have created c-suite positions for IT and security personnel such as CTOs and CISOs, these are, overall, still relatively rare.
Justin Fier's picture
Use of artificial intelligence (AI) will change the role of security teams, and improve companies’ ability to defend their data and networks from future compromises, breaches, and sabotage.
John Maddison's picture
Organizations must adopt a holistic approach to securing their distributed networked environment that enables them to see and manage their entire distributed network, including all attack vectors, through a single pane of glass.