Security Experts:

More Security Headlines

In this webinar VirusTotal will walk through an end-to-end methodology for investigating a newly-discovered malware sample. [Read More]
Alphabet’s Jigsaw unit has published a quiz that tests users’ ability to identify phishing attacks and teaches them what signs to look for to determine if a message is legitimate or not. [Read More]
A new report from Check Point discusses major cyber incidents from 2018. From these data points, Check Point's analysts look for current trends in malware and attacks, in order to prepare for 2019's future attacks. [Read More]
DHS issues an emergency directive instructing federal agencies to take measures to mitigate DNS hijacking attacks after several government domains were targeted by malicious actors. [Read More]
Nest urged owners of its security cameras to use enhanced authentication to thwart hackers, after one terrified a family with a hoax nuclear missile attack. [Read More]
Nearly 100,000 malware distribution websites have been identified and taken down over the course of 10 months as part of an abuse.ch project called URLhaus. [Read More]
ACROS Security’s 0patch releases unofficial micropatches for three unfixed vulnerabilities affecting Windows, including DoS, file read and code execution issues. [Read More]
European NGO noyb ('none of your business') filed ten GDPR-related complaints against eight international streaming services on January 18, 2019, including Amazon, Apple, Netflix and YouTube. [Read More]
Free and open Certificate Authority (CA) Let’s Encrypt has started the process of completely retiring TLS-SNI-01 validation support. [Read More]
The newly announced Act to Strengthen Identity Theft Protections in North Carolina proposes that ransomware attacks be treated as data breaches. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
In some instances, it is precisely because we are so familiar and comfortable with something that makes us incapable of seeing that there is a better way.
Jalal Bouhdada's picture
The Secure Development Lifecycle (SDL) process is still notable by its absence in many new deployments of Industrial Internet of Things (IIoT) technologies.
Marc Solomon's picture
The ability to aggregate, score and prioritize data and alerts within the context of your environment can allow you to take the right actions faster to mitigate IoT risk.
Ashley Arbuckle's picture
Network segmentation can be challenging to implement, scale, and manage. But, you shouldn’t let this reality prevent you from moving forward.
Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Josh Lefkowitz's picture
A business risk intelligence (BRI) program needs to understand and account for the different categories of risk faced by all business functions across an enterprise.
John Maddison's picture
In an SD-WAN environment, security needs to not only protect data and resources, but also ensure that performance and controlling costs are preserved.
Alastair Paterson's picture
Organizations that continuously monitor their digital footprint and understand their online exposure will be the most effective at mitigating digital risk in the new year.
Torsten George's picture
While implementing Zero Trust is a journey that cannot be achieved over night, it also doesn’t require a complete redesign of existing network architectures.
Galina Antova's picture
The next year will surprise all of us in at least one way or another. How we deal with these surprises, both individually and collectively, will, in the end, define the next twelve months.