Security Experts:

More Security Headlines

A recently observed cyber-espionage campaign targeting South Korea, the United States and Canada is reusing malicious code previously associated with state-sponsored Chinese group APT1 [Read More]
In Facebook's "War Room," a nondescript space adorned with American and Brazilian flags, a team of 20 people monitors computer screens for signs of suspicious activity [Read More]
A former high school teacher was charged in an investigation into the 2014 "celebgate" scandal in which hackers obtained nude photographs and other private information from more than 200 people, including celebrities. [Read More]
Tumblr has patched a vulnerability that could have been exploited to obtain user account information, including email addresses and protected passwords [Read More]
A former Equifax manager who was put in charge of creating the equifaxsecurity2017.com website following the massive breach at the credit reporting agency has been sentenced to 8 months of home confinement for insider trading [Read More]
British Prime Minister May will call on fellow EU leaders to take united action to punish cyber attackers, warning hackers cause economic harm and undermine democracies. [Read More]
Many servers may be exposed to attacks due to an authentication bypass vulnerability affecting the libssh SSH library [Read More]
Google released Chrome 70 on Tuesday and the latest version brings updated sign-in options and patches for 23 vulnerabilities [Read More]
The maker of the LuminosityLink RAT was sentenced to 30 months in federal prison [Read More]
A cyber espionage group named GreyEnergy, linked by researchers to Russia's BlackEnergy, has been targeting energy and transportation companies in Ukraine and other countries [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Laurence Pitt's picture
The biggest truth about security in public cloud is that it provides security at scale. As a single organization, everything you do is at a scale of one.
Mike Fleck's picture
Enterprises need proactive and automated checks and balances on cloud access management and information sharing.
Josh Lefkowitz's picture
Evaluating a threat intelligence vendor’s collection strategy effectively is a complex process that requires far more than simply obtaining the answers to the questions outlined above.
Stan Engelbrecht's picture
These seven processes should be automated in order to save valuable time during incident response and security investigation procedures, and help organizations improve their overall cybersecurity posture.
Siggi Stefnisson's picture
If I have one wish for ‘Cybersecurity Awareness Month,’ it’s that we all need to be aware of the need for innovative responses on the part of the security industry, to counter a threat industry which is innovating both technical and business models at a rapid pace.
Alastair Paterson's picture
Encouraging and supporting diversity and inclusion in the workforce will allow us to overcome the cybersecurity workforce gap now estimated to reach 1.8 million by 2022.
Preston Hogue's picture
Technical hacks to gain entry into sensitive systems are still an important part of the equation, but today they are just one tool in a much larger toolkit.
Ashley Arbuckle's picture
Customer Experience (CX) is becoming a key driver of success in the security industry, not just for companies that deliver superior customer experiences but – more importantly – for the organizations and security professionals they serve.
Devon Kerr's picture
If phishing attacks slip past the first line of defense, security teams need to be able to identify suspicious activity and stop it before hackers can learn enough about their enterprise to execute a full attack.
Lance Cottrell's picture
Studying the DNC Hacker case shows just how difficult it is to maintain a false identity in the face of a highly resourced and motivated opponent.