Security Experts:

More Security Headlines

The newly announced Act to Strengthen Identity Theft Protections in North Carolina proposes that ransomware attacks be treated as data breaches. [Read More]
WhatsApp now only allows users to forward a message to a maximum of 5 people in an effort to prevent the platform being abused to spread false information. [Read More]
Adobe patches several information disclosure vulnerabilities in Experience Manager and Experience Manager Forms. [Read More]
Russia's media watchdog Roskomnadzor launched "administrative proceedings" Monday against US social media giants Facebook and Twitter, accusing them of not complying with Russian law, news agencies reported. [Read More]
Security teams need a geopolitical risk understanding when helping to source new purchases, and must be ready to source and test alternatives whenever and wherever necessary. [Read More]
Mitsubishi Electric develops cybersecurity technology designed to protect connected cars, including their automotive head unit and control systems, against hacker attacks. [Read More]
VLC responds to criticism over the lack of HTTPS for software updates, claiming that the security risk is not as big as some suggest. [Read More]
France's data watchdog announced a fine of $57 million for Google, using the EU's strict General Data Protection Regulation (GDPR) for the first time. [Read More]
The DarkHydrus threat group is leveraging Google Drive for command and control (C&C) purposes, Palo Alto Networks security researchers say. [Read More]
Web applications can exploit browser extensions to access privileged capabilities and steal sensitive user information, including credentials, a researcher has discovered. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Jalal Bouhdada's picture
The Secure Development Lifecycle (SDL) process is still notable by its absence in many new deployments of Industrial Internet of Things (IIoT) technologies.
Marc Solomon's picture
The ability to aggregate, score and prioritize data and alerts within the context of your environment can allow you to take the right actions faster to mitigate IoT risk.
Ashley Arbuckle's picture
Network segmentation can be challenging to implement, scale, and manage. But, you shouldn’t let this reality prevent you from moving forward.
Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Josh Lefkowitz's picture
A business risk intelligence (BRI) program needs to understand and account for the different categories of risk faced by all business functions across an enterprise.
John Maddison's picture
In an SD-WAN environment, security needs to not only protect data and resources, but also ensure that performance and controlling costs are preserved.
Alastair Paterson's picture
Organizations that continuously monitor their digital footprint and understand their online exposure will be the most effective at mitigating digital risk in the new year.
Torsten George's picture
While implementing Zero Trust is a journey that cannot be achieved over night, it also doesn’t require a complete redesign of existing network architectures.
Galina Antova's picture
The next year will surprise all of us in at least one way or another. How we deal with these surprises, both individually and collectively, will, in the end, define the next twelve months.
Stan Engelbrecht's picture
The current state of automated teller machine (ATM) security is far from optimal, but the unique security challenges around ATMs make improvements difficult.