Security Experts:

More Security Headlines

The United States Department of Justice this week unsealed an indictment that charges 80 defendants for their roles in a massive fraud and money laundering scheme. [Read More]
A recent Federal Information Security Modernization Act (FISMA) annual report indicates considerable success in improving the cybersecurity of federal agencies, but some have voiced concerns over weakness in the method of reporting. [Read More]
VMWare has agreed to acquire endpoint security firm Carbon Black (NASDAQ: CBLK) in a deal representing an enterprise value of $2.1 billion. [Read More]
Sensitive data from a nuclear power plant in Ukraine was exposed due to an illegal cryptocurrency mining operation run by workers. [Read More]
Microsoft is offering up to $30,000 for vulnerabilities found in the new Chromium-based version of its Edge browser. [Read More]
ICS cybersecurity firm Claroty releases free and open source tool designed to help organizations check whether their OT devices are vulnerable to Urgent/11 attacks. [Read More]
Recently disclosed vulnerabilities affecting enterprise VPN solutions from Fortinet and Pulse Secure have been reportedly exploited in the wild. [Read More]
Vietnam and Russia are the countries most affected by attacks on Microsoft SQL Server that leverage malicious jobs. [Read More]
Vulnerabilities that Cisco Talos security researchers have discovered in various Aspose APIs could allow a remote attacker to execute code on affected machines. [Read More]
A DLL hijacking vulnerability affecting Bitdefender Antivirus Free 2020 could have been exploited for privilege escalation, whitelisting bypass and as a persistence mechanism for malware. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Laurence Pitt's picture
Black Hat 2019 recently wrapped in Las Vegas, where somewhere between 15,000 and 20,000 experts descended to experience the latest developments in the world of cybersecurity.
Jim Ducharme's picture
If you want to succeed with FIDO, you have to be ready. Now is the time to assess your organization’s authentication needs, how they are evolving, and the dynamics of your user population.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
Stan Engelbrecht's picture
What does the cyber kill chain have to do with Sherlock Holmes, and this quote in particular?
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Marc Solomon's picture
The security market has become confusing and it is not about the product or technology to be used; it is about solving a specific problem.
Seema Haji's picture
Security is often the first place IT and OT teams meet. There are always kinks to iron out, and ensuring a strong security posture is paramount regardless of the teams involved.
Preston Hogue's picture
The best way for the security industry to meet the challenge of modern applications and modern app development is to adopt a modern way of supporting those from a security perspective.
Barak Perelman's picture
The same cloud technology that has exposed OT networks to external threats is now providing an alternative for protecting organizations when the physical deployment of OT security equipment is not practical.