Security Experts:

More Security Headlines

Microsoft has made the Windows Defender Application Guard extensions generally available, which now provides hardware-based isolation to all Chrome and Firefox users on Windows 10. [Read More]
In addition to the hacking conspiracy charge brought in April by the US government, WikiLeaks founder Julian Assange now faces 17 counts under the Espionage Act. [Read More]
Facebook said it recently disabled billions of bogus accounts set up by "bad actors" and that five percent of active accounts are likely fakes. [Read More]
The hacking of U.S. election systems, including by foreign adversaries, is inevitable, and the real challenge is ensuring the country is resilient enough to withstand catastrophic problems from cyber breaches, government officials said. [Read More]
SandboxEscaper, the security researcher who posted a claimed zero-day Windows 10 vulnerability on GitHub, has now posted the remaining four exploits (two yesterday and the final two today) that he or she (we'll say 'she') said she possessed. [Read More]
Instagram said it was not the source of private contact information for millions of influential users of the service recently found in an unguarded online database. [Read More]
Siemens has teamed up with Alphabet-owned cybersecurity company Chronicle to provide industrial monitoring and detection solutions for the energy sector. [Read More]
The head of NATO told Russia and other potential foes that the Western military alliance was ready to use all means at its disposal to respond to cyber attacks. [Read More]
Comodo CA issued the largest number of digital certificates used to sign malware samples found on VirusTotal over the past year, Chronicle’s security researchers say. [Read More]
Authorities in Europe this week said they took down Bestmixer.io, one of the leading cryptocurrency mixing service in the world. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Marc Solomon's picture
Marc Solomon reviews the list of five characteristics to see how Gartner defined an intelligence-driven SOC four years ago and compare that list to where we are today.
Torsten George's picture
Using Zero Trust Privilege services can extend corporate security policies and best practices to cloud environments, while reducing costs, improving scalability across multi-VPCs, -SaaS, and -directory environments, and minimizing security blind spots through centralized management.
Ashley Arbuckle's picture
Even if SMBs don’t have the resources for a comprehensive security assessment and possible overhaul, incremental change is better than none.
Laurence Pitt's picture
In the coming years the data protection and privacy landscape will change dramatically, improving the experience for us as individuals but potentially making things more complex for businesses.
Gunter Ollmann's picture
CISOs should invest time in applying the resources of public cloud to bring automation, scalability, and AI to solving the given problem as a platform for all customers – past, present, and future.
Jalal Bouhdada's picture
By deploying robots with cybersecurity in mind we can ensure that they don’t run the danger of introducing the same negative effects into their environment.
Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.
Seema Haji's picture
Failing to implement the right security controls could open the door for attacks and disruption that threatens system availability and performance — the very reasons for leveraging the power of IoT in the first place.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Barak Perelman's picture
Passive network security monitoring has its value for identifying certain indicators of compromise (IoC), but does not detect and mitigate all attacks or incidents on ICS networks.