Security Experts:

More Security Headlines

Hackers could deliver malware to a macOS system using an Office document containing macro code, simply by getting the victim to open the document. [Read More]
Lafayette, Colorado, officials announced Tuesday the city’s computer systems were hacked and they were forced to pay a ransom to regain access. [Read More]
Vulnerabilities found in protocol gateway devices can allow hackers targeting industrial systems to launch stealthy attacks. [Read More]
State and local officials are receiving additional tools from the federal government to help defend the nation’s election systems from cyberthreats ahead of the November vote. [Read More]
Researchers analyzed DJI’s Pilot app for Android and found some security issues, but the Chinese drone giant says the claims are “misleading.” [Read More]
Researchers have described how a botnet powered by high-wattage IoT devices can manipulate the energy market. [Read More]
GreyNoise Intelligence, a startup focused on helping security teams reduce alert fatigue, has raised $4.8 million in seed investment to help the company expand its intelligence service that helps teams “prioritize alerts that matter by quieting ones that don’t.” [Read More]
A Florida teen identified as the mastermind of a scheme that gained control of Twitter accounts of prominent politicians, celebrities and technology moguls pleaded not guilty on Tuesday to multiple counts of fraud. [Read More]
Google has patched over 50 vulnerabilities in the Android operating system with the August 2020 security updates. [Read More]
Microsoft says it has paid out nearly $14 million through its bug bounty programs in the past year, with the highest rewards paid out for Hyper-V vulnerabilities. [Read More]

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
Regardless of what goes wrong, the right attitude goes a long way towards helping stakeholders regain confidence in the security team and the security program it is running.
Gunter Ollmann's picture
With a diverse and globally distributed workforce, cybersecurity buying decisions will increasingly factor accessibility, usability, and inclusiveness in solution design and operability.
John Maddison's picture
Smart businesses are learning that SD-WAN can play a critical role in quickly—and securely—rolling out new networking environments, and connecting resources and users to data and applications.
Marc Solomon's picture
With capabilities to quickly curate and integrate new threat data sources across your operations, you’re prepared for whatever the future brings.
Galina Antova's picture
When your core business operations, digital transformation initiatives and workers’ ability to do their jobs are at risk, effective OT security must become just as ubiquitous
John Maddison's picture
By combining ML and AI with a team of advanced cybersecurity professionals to deploy true AI-driven security operations, organizations can stay a step ahead of cybercriminals.
Laurence Pitt's picture
Every business is likely to be subject to cyberattacks at some point, and the option is to either take on the cost of putting measures in place before it happens or paying to clean up after.
Torsten George's picture
Today’s economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.
Joshua Goldfarb's picture
Most security organizations realize that, regardless of how much progress they’ve made towards improving maturity and efficiency, there is still more work to be done.
Idan Aharoni's picture
Many organizations are steadfast in their belief that dark web monitoring is a critical part of their security operations and the security industry is happy to fuel that belief.