Security Experts:

More Security Headlines

ICS malware known as Triton and Trisis exploited a zero-day vulnerability in Schneider Electric Triconex Safety Instrumented System (SIS) controllers [Read More]
Cloudflare has announced a new service for its customers that it calls Cloudflare Access and describes as 'democratizing' Google's BeyondCorp model. [Read More]
An espionage campaign using malware-infected messaging apps has been stealing smartphone data from activists, soldiers, lawyers, journalists and others in more than 20 countries. [Read More]
Russia-linked hackers known as Fancy Bear were highly active in the second half of 2017, and hit political organizations worldwide. [Read More]
Intel shares information on the performance impact of the recent CPU patches on data centers, and tells customers that not just systems with Broadwell and Haswell processors reboot more frequently after firmware updates [Read More]
Google has launched security center for G Suite, a tool designed to make it easier for administrators to manage an organization’s data security. [Read More]
Cisco patches high severity vulnerabilities, including privilege escalation and DoS, in email security, NX-OS and collaboration products [Read More]
Researchers earn more than $100,000 from Google for an Android exploit chain that can be used to remotely hack Pixel phones by getting the targeted user to click on a link [Read More]
Cybercriminals are delivering the Zyklon malware, which includes data theft and DDoS attack capabilities, using recently patched Office vulnerabilities [Read More]
A 24-year-old man from the UK has pleaded guilty to running services designed to help cybercriminals make their malware difficult to detect [Read More]

SecurityWeek Experts

rss icon

Stan Engelbrecht's picture
The rapidly evolving threat landscape, constantly changing best practices, and surplus of security tools make it easy to overlook important steps during incident response (IR) planning.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Josh Lefkowitz's picture
As many manufacturers continue to integrate automation, IoT devices, and other Internet-connected technologies with their OT networks, they are inadvertently expanding the attack surface area.
Jalal Bouhdada's picture
Jalal Bouhdada, Founder and Principal ICS Security Consultant at Applied Risk, discusses the implications of the new EU Directive on Security of Network and Information Systems (NIS)
Ashley Arbuckle's picture
Regularly practicing and refining your incident response plan so that you can proactively strengthen defenses and improve cyber hygiene requires ongoing attention by skilled security professionals with IR expertise.
Steven Grossman's picture
How can a company protect its information and operations without running askew of data privacy laws and the concerns of its customers?
Preston Hogue's picture
No company has the ability to mitigate all risks at all times. No company I’ve ever visited has even had all of its identified risks treated at any given point.
Alastair Paterson's picture
Like a coach, you need to be able to see the big picture with an approach that monitors the entire Internet for risks to your business.
Justin Fier's picture
With a skills gap of over a million cyber security professionals worldwide, how can organizations stay ahead of sophisticated and fast-moving attacks?