Security Experts:

More Security Headlines

Deployed inside the army command headquarters in Montenegro’s capital, an elite team of U.S. military cyber experts are plotting strategy in a fight against potential Russian and other cyberattacks ahead of the 2020 American and Montenegrin elections. [Read More]
Microsoft this week revealed plans to adopt DNS over HTTPS (DoH) in Windows 10 in an attempt to keep user traffic as private as possible. [Read More]
Ten organizations have come together to create the global Coalition Against Stalkerware to provide victim support and cybersecurity expertise. [Read More]
Vulnerabilities found in the Android camera apps provided by Google and Samsung could have been exploited by hackers to spy on users. [Read More]
Adobe informs users that support for Acrobat 2015 and Reader 2015 will end on April 7, 2020, which means the products will no longer receive security updates. [Read More]
Louisiana governor reveals that a ransomware attack hit state servers, prompting a response from the state’s cyber-security team. [Read More]
Macy’s informs customers that the checkout and wallet pages on its official website hosted a payment card skimmer between October 7 and October 15. [Read More]
A US congressional committee on Monday asked for a briefing on a Google project to modernize healthcare while giving the internet titan access to millions of people's medical data. [Read More]
It took ABB five years to inform customers of a critical vulnerability affecting one of its plant historian products and the researcher who found it believes threat actors may have known about the flaw. [Read More]
Popular password manager 1Password has closed a $200 million Series A round, which the company says is the first outside investment following 14 years of growth and profitability. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Justin Fier's picture
The arrival of 5G will fuel an explosion of never-before-seen IoT machines, introducing uncharted vulnerabilities and opening the door for cyber-criminals to compromise our increasingly intertwined cities.
Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Joshua Goldfarb's picture
When the security of our organization depends on us leaving our comfort zone, how can we ensure that we accomplish what we set out to do without putting the organization at additional risk?
Craig Harber's picture
Because attackers will exploit the paths of least resistance and move laterally through the enterprise, visibility must include all managed and unmanaged assets (enterprise IoT, shadow IoT, legacy systems, etc.)
Marc Solomon's picture
As the holiday approaches, I thought I’d take the opportunity to share three things I believe every security professional can give thanks for.
John Maddison's picture
Security-Driven Networking is a new, strategic approach to security that enables the seamless expansion of network environments and services without ever compromising on security.
Jim Ducharme's picture
In just about every case of digital identity, there seems to be a set of credential recovery mechanisms that are weaker than the authentication method itself.
Josh Lefkowitz's picture
It’s crucial to recognize that annual security predictions generally only include that which can be feasibly predicted by the final months of the prior year.
Alastair Paterson's picture
Domain name typo-squatting is an established tactic in the world of cybercrime.
Torsten George's picture
Organizations should recognize that not all authenticators are equally vulnerable to the mechanisms used to break the trust chain, which range from simple guesswork to coercion.