Security Experts:

More Security Headlines

The Novidade exploit kit is targeting home and small office routers in an attempt to compromise the mobile devices or desktop computers connected to the routers. [Read More]
Several critical infrastructure organizations in Russia have been targeted by hackers believed to be profit-driven cybercriminals rather than state-sponsored cyberspies. [Read More]
Italian oil and gas services company Saipem hit by a cyberattack. The firm is working on restoring affected systems while trying to determine who was behind the attack. [Read More]
Secure messaging applications such as Telegram, Signal and WhatsApp can expose user messages through a session hijacking attack, Cisco’s Talos security researchers warn. [Read More]
Google's CEO Sundar Pichai’s appearance Tuesday, Dec. 11, before the House Judiciary Committee comes after he angered members of a Senate panel in September by declining their invitation to testify about foreign governments’ manipulation of online services to sway U.S. political elections. [Read More]
Organizations are getting better at detecting breaches on their own, but it still takes them a long time to do it, according to a new report from CrowdStrike. [Read More]
In just one day, researchers found 7,000 "Twitter Amplification Bots", which can be used influence public opinion, increase followers for individual accounts, and be used by spammers, scammers and phishers. [Read More]
The cyberespionage group referred to as MuddyWater (AKA Seedworm) has hit over 130 victims in 30 organizations from late September to mid-November, Symantec says. [Read More]
Google will close the consumer version of its online social network sooner than originally planned due to the discovery of a new software bug. [Read More]
The Tor Project, the organization behind the Tor anonymity network, publishes financial documents showing revenues of over $4 million in 2017. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Torsten George's picture
With 2019 just around the corner, organizations should examine their overall cyber security and identity management strategies and align them to address the #1 cause of today’s data breach — privileged access abuse.
Lance Cottrell's picture
It is important to take a systematic approach to creating your Security Advisory Board (SAB). Don’t just invite the smartest, most famous people you happen to know and like.
John Maddison's picture
Organizations need to anticipate threats and target the economic motivations of cybercriminals in order to force them back to the drawing board.
Marc Solomon's picture
How do we break this wasteful cycle and enable teams and technologies to reduce instances of false positives? The answer lies in prioritization and learning.
Ashley Arbuckle's picture
Ashley Arbuckle interviews Michelle Dennedy, Cisco’s Chief Privacy Officer (CPO), to discuss how data privacy has a major impact on business.
Marie Hattar's picture
In the ever more complicated world of modern IT networks, visibility is the increasingly pressing challenge that security teams need to solve to stop cyber attacks.
Josh Lefkowitz's picture
It’s relatively commonplace for CTI and incident response teams to establish a coordinated response plan in preparation for a cyber attack, but—as demonstrated by WannaCry—it’s imperative for physical security teams to be involved in such plans as well.
Stan Engelbrecht's picture
By highlighting phishing, which causes so many headaches for all us security professionals, you can see just how much of a game-changer automation can be for any SOC or CSIRT.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
Joshua Goldfarb's picture
Organizations need to continually evaluate where each effort stands in relation to its allotted budget and schedule, along with the value it brings to the organization’s security posture.