Security Experts:

More Security Headlines

Swiss-based special-purpose vehicle maker Aebi Schmidt confirms being hit by a piece of malware and says the incident may result in disruptions to business operations. [Read More]
A cybersecurity research company has uncovered over 30 security issues affecting Java Card technology, but Oracle and Gemalto have downplayed the impact of these flaws. [Read More]
Amnesty International said its Hong Kong office was hit by a years-long cyberattack from hackers with known links to the Chinese government. [Read More]
IoT security firm VDOO raises $32 million in a Series B funding round, which brings the total raised by the company to $45 million. [Read More]
Facebook said it expects a fine of up to $5 billion from the Federal Trade Commission, which is investigating whether the social network violated its users’ privacy. [Read More]
A top White House official told Kirstjen Nielsen, then Homeland Security secretary, not to bring up election security with President Donald Trump, steering her away from discussing a critical national security threat with a president who bristles at suggestions that Russian interference contributed to his 2016 victory. [Read More]
Data protection provider Digital Guardian raises $30 million in a financing round that will help it accelerate product development and innovation. [Read More]
Recently observed attacks targeting officials within government finance authorities and representatives in several embassies in Europe abuse the legitimate TeamViewer application to gain full control of victim machines. [Read More]
The FBI’s 2018 Internet Crime Report (ICR) shows that both the incidence and cost of internet crime continues to escalate. [Read More]
The threat actor behind the DNSpionage campaign has switched to new malware in attacks observed earlier this month. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Alastair Paterson's picture
With more legislation expected, every company should ensure they have a robust framework in place along with strong data mapping capabilities.
David Holmes's picture
The debate about the deprecation of SMS as an authentication system is less about the agreed-upon insecurity of SMS and more about what can replace it. SMS survives because of its ubiquity, period.
Torsten George's picture
Shifting traditional perimeter-based enterprise security strategies to a Zero Trust approach provides more robust prevention, detection, and incident response capabilities to protect continuously expanding attack surfaces.
Preston Hogue's picture
This move to container-based development and agile methodologies has been great for innovation and iteration, but it’s also brought a massive shift in the application landscape with real impact on security teams.
Dean Weber's picture
Examining the Triton attack toolkit and methodology behind it offers industrial manufacturers and OEMs, plant safety teams and IT/OT teams more insight into what they need to do to get ahead of hardening their networks
Joshua Goldfarb's picture
There are certainly no shortcuts and no easy fixes for retaining top security talent. While the list of recommendations on this topic is lengthy, showing security talent that it is respected is high on that list.
Marc Solomon's picture
Like the teams that progress through to the NCAA National Championship, you’ve now pared down “the threat landscape” to “your threat landscape” and set yourself up for success.
Ashley Arbuckle's picture
As organizations digitize their business and make these shifts, they need to know what and who they can trust.
Gunter Ollmann's picture
As malware writers harness AI for cybercrime, the security industry must push forward with a new generation of dissection and detonation technologies to prepare for this coming wave.