Security Experts:

More Security Headlines

Cybercriminals are increasingly using shimmers instead of skimmers in attacks targeting automated teller machines, Flashpoint reports. [Read More]
Nation State Hackers, likely connected to China, have hacked multiple telecommunications companies around the world and are completely controlling the networks. [Read More]
Swiss industrial tech company ABB has patched a dozen vulnerabilities, including serious issues, in some of its HMI products. [Read More]
LokiBot and NanoCore malware are again being distributed in a malspam campaign using attached ISO image file attachments. [Read More]
Several vulnerabilities affecting the Phoenix Contact Automationworx automation software suite can be exploited for remote code execution using specially crafted project files. [Read More]
VideoLAN has addressed a critical double-free vulnerability in the VLC media player that could allow an attacker to execute arbitrary code on target systems. [Read More]
Protection against Spectre, Meltdown, RAMBleed, Rowhammer and other memory side-channel attacks has been added to OpenSSH. [Read More]
Real-time application behavior analytics, control, and protection provider TrueFort has raised $13.7 million in a Series A funding round. [Read More]
A recently discovered malicious campaign is aiming at infecting victim machines by delivering the notorious FlawedAmmyy RAT directly in memory, Microsoft warns. [Read More]
Iran claims no cyber attack against the Islamic republic has ever succeeded, after American media reported the US launched one last week amid a standoff between the two countries. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Devon Kerr's picture
How healthcare organizations used a trail of digital evidence to identify the type of attack they were experiencing and developed a remediation strategy.
Barak Perelman's picture
Since Building Management Systems (BMS) are integrated with and interconnected to both hardwired and cloud based solutions, as well as third party applications, their attack surface is large and getting larger.
Alastair Paterson's picture
Diversity of thought fosters psychological safety, which is a shared belief among teams that they perceive they are safe to take risks, and is one of the core indicators of highly effective teams.
Jim Gordon's picture
While I have blogged pretty frequently in the past, this is my first official column for any sort of major publication, and I am grateful for the opportunity from SecurityWeek.
Marc Solomon's picture
Security teams should be able to detect threats faster and use that knowledge to pivot and accelerate parallel investigations that are separate but related.
Torsten George's picture
Companies should consider moving to a Zero Trust approach, powered by additional security measures such as multi-factor authentication, to stay ahead of the security curve and leave passwords behind for good.
Ashley Arbuckle's picture
The convergence of security products and services is a welcomed development and will lead to improved security.
Laurence Pitt's picture
“The Cloud Wars” may be dominating IT news headlines, but what does this phrase actually mean? And is it something that an enterprise needs to be concerned with?
Joshua Goldfarb's picture
Five examples of how insecurity can actually help bolster a security program by allowing an organization to continually learn and make changes, thus improving.
Gunter Ollmann's picture
To the surprise of many, public cloud appears to be driving a renaissance in adoption and advancement of managed security service providers (MSSP).