Security Experts:

More Security Headlines

Vulnerabilities in Avast Antivirus, AVG Antivirus, and Avira Antivirus could allow an attacker to load a malicious DLL file in an effort to bypass defenses and escalate privileges. [Read More]
Several major tech and cybersecurity firms launch the Operational Technology Cyber Security Alliance (OTCSA), which aims to help organizations address OT security challenges. [Read More]
Recent Gustuff Android banking Trojan campaigns featured an updated malware version. [Read More]
Microsoft is working with PC manufacturing and silicon partners to design devices with a more secure firmware layer. [Read More]
A recently identified backdoor used by the China-linked Winnti hackers and which targets Microsoft SQL (MSSQL) is very stealthy. [Read More]
Malwarebytes has found sufficient evidence to suggest that Magecart 5 is really the APT group known as Carbanak. [Read More]
Microsoft is offering rewards of up to $15,000 for vulnerabilities in ElectionGuard, the open source SDK designed to make voting more secure and transparent. [Read More]
Microsoft this week announced the public preview of a new feature that allows enterprise users to check their Azure Active Directory sign-ins for any unusual activity. [Read More]
Outdated and unsupported operating systems are still present and they still pose a serious risk in many industrial organizations. [Read More]
Facebook said Monday it was tightening its security for the 2020 US elections, amid signs of fresh activity from Russia attacking Democratic presidential candidates, including Joe Biden. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Laurence Pitt's picture
Adoption of 5G not only exposes potential new attack surfaces, but given execution happens at super-speed, it also changes the required nature of any defense.
Joshua Goldfarb's picture
Security metrics is a topic that, while challenging, is also important and at the top of the priority list for security organizations. Here are five tips for leveraging security metrics to keep your organization out of the lion’s den.
Craig Harber's picture
As long as organizations continue to employ simplistic “set it and forget it” security approaches, they will be forced into playing reactive, catch-up defense against cyber attackers.
Fred Kneip's picture
Employing a third party adds risk, especially if that company is given some level of access to network and computing resources, or is asked to handle and protect critical or proprietary information.
Marc Solomon's picture
National Cybersecurity Awareness Month (NCSAM) is a great vehicle to raise awareness for cybersecurity and to remind every organization that the ability to improve security operations begins with contextual awareness.
John Maddison's picture
A single, cross-platform security strategy ensures that your cloud security deployment doesn’t replicate the challenges of complexity, siloed solutions, and solution sprawl faced in traditional network security environments.
Josh Lefkowitz's picture
Here’s a crash-course on the intelligence cycle and how you can apply and derive value from its core principles—no matter your role or security discipline:
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
The faster in-house network administrators can transition to becoming public cloud network security engineers, architects, or analysts, the faster their organizations can implement digital transformation.
Jim Gordon's picture
The decisions platform companies make have profound impacts on every single CISO on the planet, and we need more CISOs speak up. If your enterprise has the opportunity to engage with platform companies– do so.