Security Experts:

More Security Headlines

Venture funding into cybersecurity startups has continued to grow, but investors say the trend is simply unsustainable. [Read More]
Cybersecurity professionals comment on the impact of the U.S. government shutdown, which is the longest in U.S. history, nearing one month. [Read More]
Facebook has removed more than 500 pages, groups and accounts originating in Russia for engaging in what the social network called "coordinated inauthentic behavior." [Read More]
A bug in the Twitter application for Android may have exposed the protected tweets of some users, Twitter warns. [Read More]
A Portuguese hacker said by his lawyers to have played a pivotal role in the Football Leaks whistleblower website is fighting extradition from Hungary to Portugal on charges of extortion. [Read More]
Cyber-attacks that have been ongoing since at least mid-2017 hit financial institutions in West Africa, Symantec reports. [Read More]
A new threat actor operating under the “Magecart” umbrella landed a malicious skimmer on hundreds of websites through a supply chain attack, security firms reveal. [Read More]
A newly discovered set of compromised login details contains roughly 773 million email addresses, Australian web security expert Troy Hunt reveals. [Read More]
A storage server configured for public access was found to expose terabytes of data belonging to the Oklahoma Department of Securities. [Read More]
High severity DoS and XSS vulnerabilities discovered by researchers in an industrial-grade weather station made by ControlByWeb. A firmware update that patches the flaws has been released. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Marc Solomon's picture
The ability to aggregate, score and prioritize data and alerts within the context of your environment can allow you to take the right actions faster to mitigate IoT risk.
Ashley Arbuckle's picture
Network segmentation can be challenging to implement, scale, and manage. But, you shouldn’t let this reality prevent you from moving forward.
Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Josh Lefkowitz's picture
A business risk intelligence (BRI) program needs to understand and account for the different categories of risk faced by all business functions across an enterprise.
John Maddison's picture
In an SD-WAN environment, security needs to not only protect data and resources, but also ensure that performance and controlling costs are preserved.
Alastair Paterson's picture
Organizations that continuously monitor their digital footprint and understand their online exposure will be the most effective at mitigating digital risk in the new year.
Torsten George's picture
While implementing Zero Trust is a journey that cannot be achieved over night, it also doesn’t require a complete redesign of existing network architectures.
Galina Antova's picture
The next year will surprise all of us in at least one way or another. How we deal with these surprises, both individually and collectively, will, in the end, define the next twelve months.
Stan Engelbrecht's picture
The current state of automated teller machine (ATM) security is far from optimal, but the unique security challenges around ATMs make improvements difficult.
Joshua Goldfarb's picture
Before implementing a new process, making a big decision, or changing policies and procedures, you should seek a second opinion.