Security Experts:

More Security Headlines

Google has introduced a new API that effectively changes the manner in which ad blockers work in Chrome. [Read More]
Facebook has curbed access to a controversial feature allowing searches of the vast content within the social network -- a tool which raised privacy concerns but was also used for research and investigative journalism. [Read More]
Yubico is in the process of replacing YubiKey FIPS security keys following the discovery of a cryptography-related issue. [Read More]
A newly discovered piece of malware uses a peer-to-peer (p2p) network on top of InterPlanetary File System’s (IPFS) p2p network, Anomali’s security researchers report. [Read More]
Rep. Tom Graves, R-Ga., is reintroducing his Active Cyber Defense Bill. He first floated the idea in March 2017, and published an updated version in May 2017. It was then, and is now, being described as the 'hacking back' bill. [Read More]
Hong Kong's tech-savvy protesters are going digitally dark as they try to avoid surveillance and potential future prosecutions. [Read More]
ASCO, a Belgium-based company that provides aircraft parts to Airbus, Boeing and Lockheed Martin, has been severely hit by a ransomware attack. [Read More]
Android phones can now be used to verify sign-ins on Apple iPads and iPhones. [Read More]
Several serious vulnerabilities have been found by a researcher in WAGO 852 industrial managed switches. [Read More]
A researcher discovered an XSS vulnerability that could have been exploited to attack Google employees and possibly gain access to invoices and other sensitive information. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Torsten George's picture
Companies should consider moving to a Zero Trust approach, powered by additional security measures such as multi-factor authentication, to stay ahead of the security curve and leave passwords behind for good.
Ashley Arbuckle's picture
The convergence of security products and services is a welcomed development and will lead to improved security.
Laurence Pitt's picture
“The Cloud Wars” may be dominating IT news headlines, but what does this phrase actually mean? And is it something that an enterprise needs to be concerned with?
Joshua Goldfarb's picture
Five examples of how insecurity can actually help bolster a security program by allowing an organization to continually learn and make changes, thus improving.
Gunter Ollmann's picture
To the surprise of many, public cloud appears to be driving a renaissance in adoption and advancement of managed security service providers (MSSP).
Josh Lefkowitz's picture
In order to make threat intelligence more accessible and effective for more fraud teams, it’s important for vendors and practitioners alike to recognize and debunk some misconceptions.
Seema Haji's picture
As OT environments evolve, security is key to thwarting attacks with the potential to cause large and costly disruptions.
Devon Kerr's picture
Devon Kerr explains what happened when a municipality inadvertently deployed a brand-new endpoint protection technology across a small part of their production network.
Jim Ducharme's picture
The ultimate goal for identity and access management (IAM) is not to find the unbreakable or “unhackable” code for authentication; rather, it’s to layer security to create a much stronger identity assurance posture.
Ellison Anne Williams's picture
While threats facing private industry and government may once have looked distinctly different, the line separating attackers pursuing these two arenas is now so blurred that it’s often hard to distinguish one from another.