Security Experts:

More Security Headlines

Oracle has published its July 2019 Critical Patch Update (CPU), which brings a total of 319 security fixes across numerous product families. [Read More]
A Nigeria-linked threat actor active since at least 2017 has been targeting manufacturing and logistics organizations around the world with information stealers and RATs. [Read More]
Hackers accessed the accounts of Sprint customers via a Samsung website, but it does not appear that they actually breached Sprint or Samsung systems. [Read More]
There has been a marked shift towards zero trust authentication principles being used by organizations to solve the new always-on remote access problems. [Read More]
US schools increasingly targeted with cyberattacks. The widespread adoption of education technology also worsens an attack’s effects when instructional tools are rendered useless by internet outages. [Read More]
A new DNS-changer Trojan is being used in an adware campaign to prevent users from accessing security-related sites. [Read More]
Bulgaria ordered Tuesday a probe into the leak of a trove of taxpayer data in a Russia-linked cyberattack that was disclosed on the same day the former Soviet satellite nation moved to buy US-made F-16 jet fighters. [Read More]
Researchers discovered a serious vulnerability that gave remote attackers access to millions of files stored on thousands of discontinued Lenovo storage devices. [Read More]
Russia-linked threat group Turla has released new variants of the KopiLuwak Trojan in attacks detected since the beginning of this year, Kaspersky’s security researchers reveal. [Read More]
Of 4,000 software professionals surveyed by GitLab, 69% of developers are aware they’re expected to write secure code, but nearly half of security pros say it’s hard to get developers to make vulnerability remediation a priority. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Torsten George's picture
Given the likelihood of an uptick in ransomware attacks, let’s consider steps organizations can take to minimize the risk of being victimized.
Jim Gordon's picture
Intel's Jim Gordon explains how he set an example as one of a small handful of “male majority” leaders to help advance Diversity and Inclusion (D&I) efforts.
Ashley Arbuckle's picture
Shifting to a proactive approach to incident response (IR) is critical but identifying partners who can provide the capabilities you need is a challenging task.
Laurence Pitt's picture
While security spending is on the increase, it’s up to us as experienced security practitioners to make the most of this spend with a clear ROI that can be reported to the business.
Alastair Paterson's picture
If it takes a whole village to raise a child, it takes a whole community of vendors and business partners to build a secure data environment.
Preston Hogue's picture
ChatOps offers a bridge to a fully realized vision for DevSecOps, offering a much quicker path to resolution for both security and non-security issues.
Marc Solomon's picture
We can make the Security Operations Center (SOC) a powerhouse by tearing down walls between the various security groups in an organization.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
Regardless of which framework you use, it’s crucial to operationalize it in the context of your organization’s unique environment and risk factors.