Security Experts:

More Security Headlines

Canadian security firm HYAS has released a new DNS protection tool that was designed to provide clear visibility into DNS transactions into production networks. [Read More]
A cyberespionage operation aimed at industrial enterprises and public institutions in Russia and Ukraine has been linked to a Chinese threat actor. [Read More]
A new joint cybersecurity advisory from CISA and the Australian Cyber Security Centre details 2021’s top malware strains. [Read More]
BTC-e operator Alexander Vinnik, a Russian citizen, has been extradited by Greece to the United States hours after his release from a French jail. [Read More]
A vulnerability in Twitter's software that exposed an undetermined number of owners of anonymous accounts to potential identity compromise last year was apparently exploited by a malicious actor, the social media company said. [Read More]
Texas startup Ghost Security emerged from stealth this week with $15 million in investments from 468 Capital, DNX Ventures, and Munich Re Ventures. [Read More]
Slack has started forcing password resets for some workspace owners after the discovery of a security flaw that exposed credentials. [Read More]
FEMA has urged organizations to update their emergency alert systems to prevent hackers from issuing EAS alerts, but a researcher says there are no patches for some vulnerabilities. [Read More]
F5 has fixed a total of 21 vulnerabilities, including 12 high-severity issues, with its latest quarterly security patches. [Read More]
FIRST announces the release of Traffic Light Protocol version 2.0, which brings several significant changes. [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
The goal of security automation is to accelerate detection and response, but you’ll waste a lot of time if you try to eat the elephant all at once.
Laurence Pitt's picture
A well-implemented ZTNA with the ‘trust-no-one, assume nothing’ mantra is also a great tool to mitigate potential attacks.
Marie Hattar's picture
For Smart Cities to truly live up to their promise, we shouldn’t forget that – like all infrastructure – safety and security are a top priority.
Joshua Goldfarb's picture
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.
Marc Solomon's picture
With an approach that is data-driven and flexible, you can get as simple or as advanced as the detection and response demands.
Derek Manky's picture
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Gordon Lawson's picture
The adoption of IoT technology used to connect SCADA systems to the internet either directly or indirectly dramatically increases the risk of a successful exploit.
Laurence Pitt's picture
It was great to be back in-person at security events, and I enjoyed meeting with people and discussing our solutions face-to-face.
Galina Antova's picture
Over the last few years, the pandemic and work from home paradigm shift have accelerated the convergence of IT and OT networks and necessitated a consolidated strategy to address cyber risks across cyber-physical systems (CPS).
Marc Solomon's picture
Security orchestration is about getting multiple systems in the Security Operations Center (SOC) to work together so you can detect, remediate and respond across the infrastructure.