Security Experts:

More Security Headlines

Bulgaria ordered Tuesday a probe into the leak of a trove of taxpayer data in a Russia-linked cyberattack that was disclosed on the same day the former Soviet satellite nation moved to buy US-made F-16 jet fighters. [Read More]
Researchers discovered a serious vulnerability that gave remote attackers access to millions of files stored on thousands of discontinued Lenovo storage devices. [Read More]
Russia-linked threat group Turla has released new variants of the KopiLuwak Trojan in attacks detected since the beginning of this year, Kaspersky’s security researchers reveal. [Read More]
Of 4,000 software professionals surveyed by GitLab, 69% of developers are aware they’re expected to write secure code, but nearly half of security pros say it’s hard to get developers to make vulnerability remediation a priority. [Read More]
Symantec shares dropped over 10 percent on Monday following reports that the company’s acquisition talks with Broadcom have stalled due to disagreement over price. [Read More]
Many U.S. counties are buying new electoral systems, but they still run on old software that will soon be outdated and more vulnerable to hackers. [Read More]
Many companies are still failing at the basics of cyber security, and too often, organizations fail to accurately monitor all their assets. [Read More]
A researcher earned $10,000 from Tesla after discovering a stored XSS vulnerability that could have been exploited to obtain (and possibly modify) vehicle information. [Read More]
Members of the cybercriminal group behind the infamous Dridex Trojan have split from the gang and released a forked version of the BitPaymer ransomware, CrowdStrike reports. [Read More]
Clemson and other universities are working to improve cybersecurity. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Torsten George's picture
Given the likelihood of an uptick in ransomware attacks, let’s consider steps organizations can take to minimize the risk of being victimized.
Jim Gordon's picture
Intel's Jim Gordon explains how he set an example as one of a small handful of “male majority” leaders to help advance Diversity and Inclusion (D&I) efforts.
Ashley Arbuckle's picture
Shifting to a proactive approach to incident response (IR) is critical but identifying partners who can provide the capabilities you need is a challenging task.
Laurence Pitt's picture
While security spending is on the increase, it’s up to us as experienced security practitioners to make the most of this spend with a clear ROI that can be reported to the business.
Alastair Paterson's picture
If it takes a whole village to raise a child, it takes a whole community of vendors and business partners to build a secure data environment.
Preston Hogue's picture
ChatOps offers a bridge to a fully realized vision for DevSecOps, offering a much quicker path to resolution for both security and non-security issues.
Marc Solomon's picture
We can make the Security Operations Center (SOC) a powerhouse by tearing down walls between the various security groups in an organization.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
Regardless of which framework you use, it’s crucial to operationalize it in the context of your organization’s unique environment and risk factors.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.