Security Experts:

More Security Headlines

Several Shamoon 3 samples have been identified and there appear to be targets in more sectors than initially believed. Researchers also found some links to Iran. [Read More]
Security controls and processes necessary to protect ballistic missile defense system (BMDS) technical information and the United States Department of Defense (DoD) facilities haven’t been properly implemented, a newly published audit report reveals. [Read More]
Twitter recently addressed a security vulnerability that resulted in certain applications not showing to the user all of the permissions they had. [Read More]
Avanan, a company that provides security solutions for SaaS-based email and collaboration platforms, has raised $25 million in a Series B funding round. [Read More]
The Irish data watchdog on Friday launched an investigation into Facebook, after the social media titan admitted a "bug" may have exposed unposted photos from up to 6.8 million users. [Read More]
SQLite vulnerability dubbed Magellan can be exploited for remote code execution, information leaks and DoS attacks. Chrome and other popular applications using SQLite are affected. [Read More]
Germany's IT watchdog has expressed scepticism about calls for a boycott of Chinese telecoms giant Huawei, saying it has seen no evidence the firm could use its equipment to spy for Beijing. [Read More]
Facebook discovered a vulnerability in the Photo API that could have allowed third-party apps to access all of a user’s photos. Up to 6.8 million users and 1,500 apps are impacted. [Read More]
4iQ, which describes its self as the "identity intelligence company", has secured $18 million in Series B funding, bringing the total raised by the company to date to $32 million. [Read More]
Siemens SINUMERIK controllers are affected by DoS, privilege escalation and code execution vulnerabilities, including several flaws rated critical. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Jalal Bouhdada's picture
In the event of a cybersecurity incident in an industrial environment, you should follow a well-established seven step response process.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Alastair Paterson's picture
As you develop a brand protection program, here are five concrete things you can do now to proactively identify and mitigate risk to your brand.
Torsten George's picture
With 2019 just around the corner, organizations should examine their overall cyber security and identity management strategies and align them to address the #1 cause of today’s data breach — privileged access abuse.
Lance Cottrell's picture
It is important to take a systematic approach to creating your Security Advisory Board (SAB). Don’t just invite the smartest, most famous people you happen to know and like.
John Maddison's picture
Organizations need to anticipate threats and target the economic motivations of cybercriminals in order to force them back to the drawing board.
Marc Solomon's picture
How do we break this wasteful cycle and enable teams and technologies to reduce instances of false positives? The answer lies in prioritization and learning.
Ashley Arbuckle's picture
Ashley Arbuckle interviews Michelle Dennedy, Cisco’s Chief Privacy Officer (CPO), to discuss how data privacy has a major impact on business.
Marie Hattar's picture
In the ever more complicated world of modern IT networks, visibility is the increasingly pressing challenge that security teams need to solve to stop cyber attacks.
Josh Lefkowitz's picture
It’s relatively commonplace for CTI and incident response teams to establish a coordinated response plan in preparation for a cyber attack, but—as demonstrated by WannaCry—it’s imperative for physical security teams to be involved in such plans as well.