Security Experts:

More Security Headlines

4iQ, which describes its self as the "identity intelligence company", has secured $18 million in Series B funding, bringing the total raised by the company to date to $32 million. [Read More]
Siemens SINUMERIK controllers are affected by DoS, privilege escalation and code execution vulnerabilities, including several flaws rated critical. [Read More]
Facebook has paid out over $1.1 million through its bug bounty program in 2018, which brings the total paid by the social media giant since the launch of its program to $7.5 million. [Read More]
A wave of bomb threats emailed to hundreds of schools, businesses and government buildings across the U.S. triggered searches, evacuations and fear — but there were no signs of explosives, and authorities said the scare appeared to be a crude extortion attempt. [Read More]
Italian oil services company Saipem has confirmed that its systems were hit by a new variant of Shamoon, but the malware has also reportedly been used against other energy firms operating in the Middle East. [Read More]
Security-minded Android application developers can better secure user data, thanks to new cryptographic features in Android 9.0, Google says. [Read More]
As U.S. President Donald Trump re-imposed harsh economic sanctions on Iran last month, hackers scrambled to break into personal emails of American officials tasked with enforcing them. [Read More]
Security operations center (SOC)-as-a-service provider Arctic Wolf Networks announced its acquisition of RootSecure Corp. [Read More]
Tigera, a company that specializes in Kubernetes security and compliance, raises $30 million in a Series B funding round, which brings the total raised by the company to date to $53 million. [Read More]
A recent campaign attributed to the Russian cyber-espionage group Sofacy hit government agencies in four continents in an attempt to infect them with malware, Palo Alto Networks security researchers say. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Alastair Paterson's picture
As you develop a brand protection program, here are five concrete things you can do now to proactively identify and mitigate risk to your brand.
Torsten George's picture
With 2019 just around the corner, organizations should examine their overall cyber security and identity management strategies and align them to address the #1 cause of today’s data breach — privileged access abuse.
Lance Cottrell's picture
It is important to take a systematic approach to creating your Security Advisory Board (SAB). Don’t just invite the smartest, most famous people you happen to know and like.
John Maddison's picture
Organizations need to anticipate threats and target the economic motivations of cybercriminals in order to force them back to the drawing board.
Marc Solomon's picture
How do we break this wasteful cycle and enable teams and technologies to reduce instances of false positives? The answer lies in prioritization and learning.
Ashley Arbuckle's picture
Ashley Arbuckle interviews Michelle Dennedy, Cisco’s Chief Privacy Officer (CPO), to discuss how data privacy has a major impact on business.
Marie Hattar's picture
In the ever more complicated world of modern IT networks, visibility is the increasingly pressing challenge that security teams need to solve to stop cyber attacks.
Josh Lefkowitz's picture
It’s relatively commonplace for CTI and incident response teams to establish a coordinated response plan in preparation for a cyber attack, but—as demonstrated by WannaCry—it’s imperative for physical security teams to be involved in such plans as well.
Stan Engelbrecht's picture
By highlighting phishing, which causes so many headaches for all us security professionals, you can see just how much of a game-changer automation can be for any SOC or CSIRT.