Security Experts:

More Security Headlines

Popular European online contact lenses supplier Vision Direct on Monday revealed that customer data was compromised in a data breach earlier this month. [Read More]
A recent attack targeted Drupal web servers with a chain of vulnerabilities that included the infamous Drupalgeddon2 and DirtyCOW flaws, Imperva security researchers say. [Read More]
OSIsoft warns employees, interns, consultants and contractors that all domain accounts have likely been compromised [Read More]
Two individuals sentenced to prison for their roles in the 2015 hacking of British telecoms company TalkTalk [Read More]
China has sharply escalated cyberattacks on Australian companies this year in a "constant, significant effort" to steal intellectual property, according to a report. [Read More]
Vulnerabilities TP-Link recently addressed in the TL-R600VPN small and home office (SOHO) router could lead to remote code execution, Cisco Talos security researchers warn. [Read More]
People who have synced their mobile phones with a wide variety of vehicle infotainment systems may have have their personal information exposed to a new type of vehicle hack. [Read More]
Instagram informs some users that their passwords may have been exposed as a result of using the “Download Your Data” tool [Read More]
Microsoft has unveiled several enhancements to its Windows Defender Advanced Threat Protection (ATP) product to improve its protection capabilities. [Read More]
Documents used in cyberattacks conducted by Iran-linked cyber-espionage group OilRig (APT34) were delivered to the intended victim via a spear-phishing email within 20 minutes after creation. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Mike Fleck's picture
A small business with one running all of IT, cannot defend against cyber-attacks from the North Korean military with the same vigor as Lockheed Martin or Northrup Grumman.
Marc Solomon's picture
Adversaries are increasingly masterful at taking advantage of these seams between technologies and teams to infiltrate organizations and remain below the radar.
John Maddison's picture
There are three basic security components that every organization with an open BYOD strategy needs to be familiar with.
Ashley Arbuckle's picture
Whatever form your move to the cloud takes, you need the right technologies and talent in place to ensure a secure transition.
Torsten George's picture
Like the NIST Cybersecurity Framework, it integrates relevant regulations (e.g., HIPAA) and standards (NIST 800-53, ISO 27001, PCI DSS) into a single overarching security framework.
Preston Hogue's picture
It’s a good reminder that communications in cyberspace can have a long shelf life that both individuals and organizations would be wise to consider.
Galina Antova's picture
From a communications and technical standpoint, the Onslow Water and Sewer Authority (ONWASA) turned a malicious cyber incident into a strong success story on many fronts.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Lance Cottrell's picture
If strategic thinking, introspection, re-focusing, and hard truths sound worth the effort, the next question is how to make sure you get that value from your Security Advisory Board (SAB).
Laurence Pitt's picture
ePrivacy takes GDPR's approach a step further by ensuring personal and family privacy in relation to data collection, storage and usage.