Security Experts:

More Security Headlines

Suspected hackers last month briefly disrupted the website of the authority running Germany's September 26 general election. [Read More]
The critical security bug was patched last week, when Zoho was already seeing in-the-wild attacks targeting it. [Read More]
On Wednesday, Sept. 15, 2021, a divided federal appeals court upheld the dismissal of an ACLU lawsuit challenging a portion of the National Security Agency's warrantless surveillance of Americans' international email and phone communications. [Read More]
Nearly two dozen cybersecurity mergers and acquisitions were announced in the first half of September 2021. [Read More]
Endpoint security platform Kolide gets a fresh round of capital from venture capital investors. [Read More]
Google announced plans to support the Open Source Technology Improvement Fund in launching its Managed Audit Program to review critical open source projects. [Read More]
As part of its first transparency report, the cybersecurity firm says it rejected all requests for user data received last year. [Read More]
The UN called Wednesday for a moratorium on artificial intelligence systems like facial recognition technology that threaten human rights until "guardrails" are in place against violations. [Read More]
The researchers reverse-engineered Apple’s BootROM and built a software toolkit to explore vulnerabilities in Apple’s systems-on-a-chip (SoC). [Read More]
Drupal developers inform users about patches for five moderately critical CSRF and access bypass vulnerabilities. [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
Enterprises can't rely on Endpoint Protection Platforms (EPP) or Endpoint Detection and Response (EDR) tools to detect suspicious activity on a user’s system to quarantine the system or even to reimage.
Idan Aharoni's picture
Despite having different infrastructure, goals and methods, threat actors do not work in a vacuum. They feed off of each other.
Derek Manky's picture
How can organizations fight ransomware? The best solution is always prevention. Here are three tactics toward that goal.
Tim Bandos's picture
When it comes to ensuring cyber talent retention, establishing the right working environment is critical to keeping people engaged and motivated to stay.
Gordon Lawson's picture
Current cloud deployments pose significant risks that could be mitigated with minor changes to infrastructure procurement and access.
Torsten George's picture
As it has become clear that remote/hybrid work is here to stay, IT security practitioners must figure out how to enable a secure and resilient anywhere workforce to minimize their future risk exposure.
Jeff Orloff's picture
It’s important to show the effectiveness of training initiatives. Managers want to make sure that they're getting a return on their investment and justify future training budgets requests.
Laurence Pitt's picture
We have had to accelerate into remote and now hybrid working models over the last year and a half. Now that we are getting back to work, there is still much to do as everything moves fast.
Joshua Goldfarb's picture
The question of the importance of the state of a client device is a debate that has been around for a few years in the security field.
Landon Winkelvoss's picture
Security and intelligence teams often lack finished intelligence, which leaves them ill-equipped to combat motivated and sophisticated adversaries.