Security Experts:

More Security Headlines

The Indiana National Guard says a state, non-military computer server containing personal information on civilian and military Guard personnel was the target of a recent ransomware attack. [Read More]
Over a dozen vulnerabilities, including remote code execution and DoS flaws, have been found in FreeRTOS. The microcontroller OS is used for consumer products, B2B solutions and industrial automation [Read More]
EU leaders on Thursday condemned the attempted hack on the global chemical weapons watchdog and vowed to step up the bloc's efforts to tackle cyber attacks [Read More]
Mozilla announces that Firefox Nightly now supports encrypting the Transport Layer Security (TLS) Server Name Indication (SNI) extension [Read More]
Several vulnerabilities patched in Drupal 7 and 8, including two ‘critical’ remote code execution vulnerabilities [Read More]
Several vulnerabilities, including ones rated high severity, have been patched in Splunk Enterprise and Splunk Light [Read More]
Celia/VGo telepresence robots from Vecna are affected by several vulnerabilities [Read More]
NFCdrip attack shows that NFC can be used for long-range exfiltration. Passwords and other data can be quickly stolen over tens of meters [Read More]
Apple users can now get a copy of the data the tech giant has on them, directly from a refreshed and expanded privacy website rolled out this week [Read More]
Google has packed the recently launched Pixel 3 and Pixel 3 XL devices with Titan M, a security chip that can better protect information at hardware level [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Laurence Pitt's picture
The biggest truth about security in public cloud is that it provides security at scale. As a single organization, everything you do is at a scale of one.
Mike Fleck's picture
Enterprises need proactive and automated checks and balances on cloud access management and information sharing.
Josh Lefkowitz's picture
Evaluating a threat intelligence vendor’s collection strategy effectively is a complex process that requires far more than simply obtaining the answers to the questions outlined above.
Stan Engelbrecht's picture
These seven processes should be automated in order to save valuable time during incident response and security investigation procedures, and help organizations improve their overall cybersecurity posture.
Siggi Stefnisson's picture
If I have one wish for ‘Cybersecurity Awareness Month,’ it’s that we all need to be aware of the need for innovative responses on the part of the security industry, to counter a threat industry which is innovating both technical and business models at a rapid pace.
Alastair Paterson's picture
Encouraging and supporting diversity and inclusion in the workforce will allow us to overcome the cybersecurity workforce gap now estimated to reach 1.8 million by 2022.
Preston Hogue's picture
Technical hacks to gain entry into sensitive systems are still an important part of the equation, but today they are just one tool in a much larger toolkit.
Ashley Arbuckle's picture
Customer Experience (CX) is becoming a key driver of success in the security industry, not just for companies that deliver superior customer experiences but – more importantly – for the organizations and security professionals they serve.
Devon Kerr's picture
If phishing attacks slip past the first line of defense, security teams need to be able to identify suspicious activity and stop it before hackers can learn enough about their enterprise to execute a full attack.
Lance Cottrell's picture
Studying the DNC Hacker case shows just how difficult it is to maintain a false identity in the face of a highly resourced and motivated opponent.