Security Experts:

More Security Headlines

"Credential Stuffing is growing fast," Rich Bolstridge, chief strategist for financial services at Akamai Technologies, told SecurityWeek. "In March and April 2018 we logged over 6 billion malicious login attempts. By May and June, this had risen to more than 8 billion attempts." [Read More]
Twitter warns users of a bug that may have caused some direct messages to be sent to third-party developers. The problem existed for over a year and affected roughly 3 million users [Read More]
Hackers are taking advantage of lax security in the chain of businesses involved in real estate and a potential for a large payoff. [Read More]
A newly discovered piece of malware combines ransomware and botnet capabilities in a single package, Trend Micro security researchers reveal. [Read More]
Trend Micro's Zero Day Initiative (ZDI) has shared details on a zero-day vulnerability impacting the Microsoft JET Database Engine. [Read More]
Cloudflare announced a new service meant to provide users of the Tor browsers with improved security and performance. [Read More]
Accounting firm Moss Adams has acquired cyber risk management firm AsTech Consulting to help improve the cybersecurity offerings to its clients and prospects. [Read More]
Remote administration tools (RATs) used for legitimate purposes in operational technology networks can pose a serious risk, allowing malicious actors to target industrial systems, Kaspersky warns [Read More]
Facebook said it will have a "war room" up and running on its Silicon Valley campus to quickly repel efforts to use the social network to meddle in upcoming elections. [Read More]
DMARC has been fully implemented on two thirds of U.S. government domains, but there’s less than a month until all domains should be compliant with BOD 18-01 [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Josh Lefkowitz's picture
It is important to understand how the right intelligence can support network defense teams, fraud, physical security, M&A, insider threat, supply chain, and brand reputation teams, among others.
Siggi Stefnisson's picture
The truth is that quite a lot of malware is developed by an organization—an actual office of people that show up and spend their working day writing malware for a paycheck.
Alastair Paterson's picture
Although the challenge may seem insurmountable, there’s a lot that security professionals can do to mitigate insider risk.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Galina Antova's picture
The most successful organizations will be the ones that look at cyber risk holistically and build bridges between the IT, OT, and Security organizations.
Nick Sanna's picture
Cyber risk has risen to the level of enterprise risk – which they expect to be measured, managed, and reported in the terms that the rest of the enterprise understands.
Marie Hattar's picture
Cybersecurity teams need to adopt an adversarial mindset and understand what their enemies are capable of and prepare an appropriate response.
Marc Solomon's picture
ThreatQuotient's Marc Solomon talks with Glen Jones, senior director of Identity and Risk Products at Visa, to discuss on cyber threat and payment card data protection.
John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Ashley Arbuckle's picture
Through security orchestration and automation, you can gather threat intelligence from the cloud, translate it into a useable format and create new blacklists.