Security Experts:

More Security Headlines

Identity-as-a-Service (IDaaS) company Auth0 closed a $103 million round of Series E funding led by Sapphire Ventures, at a valuation of more than $1 billion. [Read More]
Washington has warned that Chinese-made drones could be giving spy agencies in Beijing "unfettered access" to stolen data, according to a report in American media. [Read More]
Tampa Bay, FL-based security awareness and simulated phishing firm KnowBe4 has acquired Oslo, Norway-based security culture measurement company CLTRe for an undisclosed sum. [Read More]
Canadian authorities announce that Defiant Tech, the company that ran LeakedSource, pleaded guilty to trafficking identity information and possession of property obtained through crime. [Read More]
US officials delayed a ban on American technology exports to Chinese tech giant Huawei until mid-August, saying the time was needed to allow for software updates and other contractual obligations. [Read More]
As organizations migrate to Microsoft Office 365 and other cloud services, many fail to use proper configurations that ensure good security practices. [Read More]
Siemplify, a provider of security orchestration, automation and response (SOAR) tools, has secured $30 million in a Series C funding round led by Georgian Partners. [Read More]
A memory corruption vulnerability recently found in Linux Kernel’s implementation of RDS over TCP could lead to privilege escalation. [Read More]
Salesforce deployed a database script that inadvertently enabled all permissions for all user profiles in some organizations, which resulted in everyone within the organization having access access to company data. [Read More]
Huawei has promised to continue delivering Android security updates to existing phones and tablets after Google suspended business with the Chinese company. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Jalal Bouhdada's picture
Protecting global transport networks should be a priority for operators, governments and cybersecurity professionals.
Josh Lefkowitz's picture
Online "card shops" can be invaluable resources for those seeking to better understand and combat fraud and cybercrime.
Ellison Anne Williams's picture
Data in Use has become a point of least resistance for an attacker. There is a major industry need to recognize this lapse and close the gap in data security by protecting data while it is being used.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Alastair Paterson's picture
With more legislation expected, every company should ensure they have a robust framework in place along with strong data mapping capabilities.
David Holmes's picture
The debate about the deprecation of SMS as an authentication system is less about the agreed-upon insecurity of SMS and more about what can replace it. SMS survives because of its ubiquity, period.
Torsten George's picture
Shifting traditional perimeter-based enterprise security strategies to a Zero Trust approach provides more robust prevention, detection, and incident response capabilities to protect continuously expanding attack surfaces.
Preston Hogue's picture
This move to container-based development and agile methodologies has been great for innovation and iteration, but it’s also brought a massive shift in the application landscape with real impact on security teams.
Dean Weber's picture
Examining the Triton attack toolkit and methodology behind it offers industrial manufacturers and OEMs, plant safety teams and IT/OT teams more insight into what they need to do to get ahead of hardening their networks
Joshua Goldfarb's picture
There are certainly no shortcuts and no easy fixes for retaining top security talent. While the list of recommendations on this topic is lengthy, showing security talent that it is respected is high on that list.