Security Experts:

More Security Headlines

Italian oil services company Saipem has confirmed that its systems were hit by a new variant of Shamoon, but the malware has also reportedly been used against other energy firms operating in the Middle East. [Read More]
Security-minded Android application developers can better secure user data, thanks to new cryptographic features in Android 9.0, Google says. [Read More]
As U.S. President Donald Trump re-imposed harsh economic sanctions on Iran last month, hackers scrambled to break into personal emails of American officials tasked with enforcing them. [Read More]
Security operations center (SOC)-as-a-service provider Arctic Wolf Networks announced its acquisition of RootSecure Corp. [Read More]
Tigera, a company that specializes in Kubernetes security and compliance, raises $30 million in a Series B funding round, which brings the total raised by the company to date to $53 million. [Read More]
A recent campaign attributed to the Russian cyber-espionage group Sofacy hit government agencies in four continents in an attempt to infect them with malware, Palo Alto Networks security researchers say. [Read More]
McAfee says that it has discovered a new global cyberattack campaign that targets nuclear, defense, energy, and financial companies using fileless malware. [Read More]
WordPress 5.0.1 patches several vulnerabilities, including XSS flaws and weaknesses that allow attackers to delete files, create posts of unauthorized types, and obtain email addresses and passwords. [Read More]
GitLab launches public bug bounty program with rewards of up to $12,000 for critical vulnerabilities. [Read More]
The French foreign ministry said Thursday its travel alert registry website had been pirated and citizens' personal data "could be misused". [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Alastair Paterson's picture
As you develop a brand protection program, here are five concrete things you can do now to proactively identify and mitigate risk to your brand.
Torsten George's picture
With 2019 just around the corner, organizations should examine their overall cyber security and identity management strategies and align them to address the #1 cause of today’s data breach — privileged access abuse.
Lance Cottrell's picture
It is important to take a systematic approach to creating your Security Advisory Board (SAB). Don’t just invite the smartest, most famous people you happen to know and like.
John Maddison's picture
Organizations need to anticipate threats and target the economic motivations of cybercriminals in order to force them back to the drawing board.
Marc Solomon's picture
How do we break this wasteful cycle and enable teams and technologies to reduce instances of false positives? The answer lies in prioritization and learning.
Ashley Arbuckle's picture
Ashley Arbuckle interviews Michelle Dennedy, Cisco’s Chief Privacy Officer (CPO), to discuss how data privacy has a major impact on business.
Marie Hattar's picture
In the ever more complicated world of modern IT networks, visibility is the increasingly pressing challenge that security teams need to solve to stop cyber attacks.
Josh Lefkowitz's picture
It’s relatively commonplace for CTI and incident response teams to establish a coordinated response plan in preparation for a cyber attack, but—as demonstrated by WannaCry—it’s imperative for physical security teams to be involved in such plans as well.
Stan Engelbrecht's picture
By highlighting phishing, which causes so many headaches for all us security professionals, you can see just how much of a game-changer automation can be for any SOC or CSIRT.