Security Experts:

More Security Headlines

Hackers have stolen 6.7 billion yen ($60 million) worth of cryptocurrencies from Japanese Zaif digital currency exchange, the operators said. [Read More]
Shanghai police have arrested a man in connection with a data leak at NASDAQ-listed Chinese hotelier Huazhu Group after the suspect failed to sell the information online. [Read More]
U.S. Department of Defense releases new cyber strategy, which supersedes the 2015 strategy, and the focus is on Russia and China [Read More]
Facebook this week revealed new tools that are aimed to defend users associated with US political campaigns ahead of the 2018 midterm elections. [Read More]
As part of a 2-year investigation into NSO Group’s sophisticated Pegasus spyware, Citizen Lab has identified 45 countries where operators might be leveraging the malware to conduct surveillance operations. [Read More]
North American tech-focused e-retailer Newegg appears to be the latest e-commerce website to have been found infected with the Magecart credit card data-scraping code. [Read More]
Foreign government hackers continue to target the personal email accounts of U.S. senators and their aides — and the Senate’s security office has refused to defend them, lawmaker says [Read More]
Adobe patches 7 vulnerabilities in Acrobat and Reader, including a critical code execution flaw [Read More]
According to a survey of claimed hackers, the most common method of hacking used by the respondents (56.03%) is social engineering -- it's easier and a lot cheaper than using a zero-day exploit. [Read More]
Illicit cryptocurrency mining has been surging over the past year, in part due to the leaked "EternalBlue" exploit from the US National Security Agency, researchers said. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Alastair Paterson's picture
Although the challenge may seem insurmountable, there’s a lot that security professionals can do to mitigate insider risk.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Galina Antova's picture
The most successful organizations will be the ones that look at cyber risk holistically and build bridges between the IT, OT, and Security organizations.
Nick Sanna's picture
Cyber risk has risen to the level of enterprise risk – which they expect to be measured, managed, and reported in the terms that the rest of the enterprise understands.
Marie Hattar's picture
Cybersecurity teams need to adopt an adversarial mindset and understand what their enemies are capable of and prepare an appropriate response.
Marc Solomon's picture
ThreatQuotient's Marc Solomon talks with Glen Jones, senior director of Identity and Risk Products at Visa, to discuss on cyber threat and payment card data protection.
John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Ashley Arbuckle's picture
Through security orchestration and automation, you can gather threat intelligence from the cloud, translate it into a useable format and create new blacklists.
Torsten George's picture
Solving the security challenges healthcare providers face will fuel faster growth, enable further digital transformation, and ultimately result in enhanced patient care and data protection.
Preston Hogue's picture
Security teams should think about how company data might connect with data from other organizations or industries and how those combined data sets could be triangulated into a larger picture that ultimately puts you at risk.