Security Experts:

More Security Headlines

A critical vulnerability affecting a GDPR compliance plugin for WordPress has been exploited in the wild [Read More]
A malicious group known as the “Inception” attackers has been using a year-old Office exploit and a new backdoor in recent attacks, Palo Alto Networks security researchers warn. [Read More]
VMware patches critical VM escape vulnerability disclosed recently by a researcher at the Chinese hacking competition GeekPwn2018 [Read More]
Vulnerabilities discovered by researchers in several Roche medical devices can put patients at risk [Read More]
Minneapolis-based identity firm Entrust Datacard has acquired Barcelona, Spain firm Safelayer Secure Communications. Financial details were not been disclosed. [Read More]
A new report from Tenable shows that prioritizing vulnerabilities based on severity and exploitability is increasingly ineffective. The number of new flaws found this year could reach 19,000 [Read More]
A code execution vulnerability (CVE-2018-15961) patched by Adobe in ColdFusion in September has been exploited in the wild by an APT group and possibly others [Read More]
ForeScout Technologies has acquired operational technology (OT) network security firm SecurityMatters for approximately $113 million in cash. [Read More]
A newly discovered botnet that appears designed to send spam emails likely infected around 400,000 machines to date, 360 Netlab security researchers warn. [Read More]
Several DoS vulnerabilities have been patched in nginx, the open source web server software used by hundreds of millions of websites [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Lance Cottrell's picture
If strategic thinking, introspection, re-focusing, and hard truths sound worth the effort, the next question is how to make sure you get that value from your Security Advisory Board (SAB).
Laurence Pitt's picture
ePrivacy takes GDPR's approach a step further by ensuring personal and family privacy in relation to data collection, storage and usage.
Justin Fier's picture
The rapid shift toward hyper-connected “smart” ports is rendering physical harbors susceptible to traditionally digital threats.
Marie Hattar's picture
A big part of making autonomous driving accessible will be the ability for car makers and suppliers to secure the networks that power these increasingly sophisticated vehicles.
Josh Lefkowitz's picture
There’s no point in having billions of data points if those data points aren’t timely, accurate, actionable, and adequately map to your intelligence objectives and requirements.
Travis Greene's picture
A Consumer Identity and Access Management (CIAM) approach can help your security organization gain a reputation as a business partner that drives heightened user experiences and business competitiveness.
Erin O’Malley's picture
Like dog bites, the negative impact of cyber incidents can go from bad to worse quickly—and the first 48 hours are critical.
Alastair Paterson's picture
As we continue to gear up for an increase in shopping this holiday season, remember that attackers continue to innovate and update their training and skills regularly.
Joshua Goldfarb's picture
Here are few ways in which organizations can work smarter, rather than harder to improve their information security postures in a resource-constrained environment.