Security Experts:

More Security Headlines

BlackBerry has agreed to acquire next-generation endpoint security firm Cylance for US $1.4 billion in cash. [Read More]
Trend Micro and Moxa announce TXOne Networks, a joint venture focusing on securing Industrial Internet of Things (IIoT) environments [Read More]
The threat actors behind many Dridex and Locky campaigns have been using a new Remote Access Trojan (RAT) called tRat, Proofpoint security researchers warn. [Read More]
Cognigo, a Tel Aviv, Israel-based startup focused on data protection and compliance, has completed an $8.5 million Series A round of funding. [Read More]
Mozilla has added a new feature to Firefox to alert users when they visit a website that has been part of a data breach in the past. [Read More]
Anti-phishing firm Cofense (formerly PhishMe) has discovered an uptick in the use of .com file extensions in phishing email attacks. [Read More]
GreatHorn has expanded its machine-learning phishing protection system into a complete email security platform that addresses every potential stage of a phishing attack with integrated threat detection, protection, and incident response. [Read More]
U.S. Office of Personnel Management (OPM) has improved its security posture since the data breaches disclosed in 2015, but many issues are still unresolved, GAO says in a report [Read More]
Congress passes Cybersecurity and Infrastructure Security Agency (CISA) Act, which creates a new cybersecurity agency at the DHS [Read More]
Industrial cybersecurity firm Dragos raises $37 million, which it will use to accelerate growth of its software platform, threat intelligence, and threat operations services [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Marc Solomon's picture
Adversaries are increasingly masterful at taking advantage of these seams between technologies and teams to infiltrate organizations and remain below the radar.
John Maddison's picture
There are three basic security components that every organization with an open BYOD strategy needs to be familiar with.
Ashley Arbuckle's picture
Whatever form your move to the cloud takes, you need the right technologies and talent in place to ensure a secure transition.
Torsten George's picture
Like the NIST Cybersecurity Framework, it integrates relevant regulations (e.g., HIPAA) and standards (NIST 800-53, ISO 27001, PCI DSS) into a single overarching security framework.
Preston Hogue's picture
It’s a good reminder that communications in cyberspace can have a long shelf life that both individuals and organizations would be wise to consider.
Galina Antova's picture
From a communications and technical standpoint, the Onslow Water and Sewer Authority (ONWASA) turned a malicious cyber incident into a strong success story on many fronts.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Lance Cottrell's picture
If strategic thinking, introspection, re-focusing, and hard truths sound worth the effort, the next question is how to make sure you get that value from your Security Advisory Board (SAB).
Laurence Pitt's picture
ePrivacy takes GDPR's approach a step further by ensuring personal and family privacy in relation to data collection, storage and usage.
Justin Fier's picture
The rapid shift toward hyper-connected “smart” ports is rendering physical harbors susceptible to traditionally digital threats.