Security Experts:

More Security Headlines

Dell patches high-severity vulnerabilities affecting a driver that is present on hundreds of millions of devices. [Read More]
A new variant of the Buer malware loader written in Rust has been detected, which could help the threat evade anti-malware detections that are based on features of the malware written in C. [Read More]
Trend Micro announces a new endpoint security solution developed by TXOne Networks for operational technology (OT) environments. [Read More]
Cyber protection solutions provider Acronis has raised another $250 million at a valuation of $2.5 billion. [Read More]
Version 9 of the ATT&CK framework introduces techniques related to containers and Google Workspace, as well as other changes. [Read More]
Apple’s problems with zero-day attacks continued this week with news of another mysterious in-the-wild compromise on iPhones and macOS devices. [Read More]
The Alaska Court System has temporarily disconnected most of its operations from the internet after a cybersecurity threat on Saturday, including its website and removing the ability to look up court records. [Read More]
The embattled VPN vendor provides cover for CVE-2021-22893, a major security flaw being exploited by advanced threat actors. [Read More]
Tens of cybersecurity mergers and acquisitions were announced in April 2021, including by Atos, Mastercard, Rapid7, Thoma Bravo and Accenture. [Read More]
Researchers show how Tesla cars could have been hacked remotely, from a drone, without any user interaction. [Read More]

SecurityWeek Experts

rss icon

Idan Aharoni's picture
Taking down dark web sites may cause headache for both the bad guys and the good guys, but it can also have a profound positive effect on the fight against cybercrime.
Gunter Ollmann's picture
Once live stomping around vendor-packed expo halls at security conferences returns, it is highly probable that “Virtual Analyst” will play a starring role in buzzword bingo.
William Lin's picture
“What’s hot right now in security?” is one of the most common questions I hear from CISOs, vendors and VCs alike.
Yaniv Vardi's picture
As industrial cybersecurity rises to the top of priority lists for CISOs and their boards, we have an opportunity to think differently about industrial operations protection.
Marc Solomon's picture
To gain a comprehensive understanding of the threats you are facing and what you must defend, you need to start by aggregating internal data from across the entire ecosystem
Joshua Goldfarb's picture
Josh Goldfarb debunks the most common myths surrounding fraud, security and user experience.
Derek Manky's picture
Each side of the public-private collaboration has resources and capabilities that shore up the other and increase effectiveness in combatting cybercrime.
Torsten George's picture
Cyber resilience can be considered a preventive measure to counteract human error, malicious actions, and decayed, insecure software.
Tim Bandos's picture
The ransomware threat could still become more pervasive over the next two to three years, not because ransomware is effective in and of itself but because of other players in the game continue to fan the flames.
John Maddison's picture
Security tools, regardless of where they have been deployed, need to be able leverage common security intelligence feeds and share alerts and threat data with other security tools.