Security Experts:

More Security Headlines

Facebook gathers intelligence from its platform to identify people who threaten the firm or its workers, the social network said in response to media reports of the security tactic. [Read More]
Malicious actors have been hacking WordPress websites by exploiting vulnerabilities in a fairly popular plugin called WP Cost Estimation & Payment Forms Builder. [Read More]
Carbon Black’s security researchers recently discovered a new variant of the Shlayer malware that targets macOS versions ranging from 10.10.5 to 10.14.3. [Read More]
Germany is to join the ranks of NATO countries making its cyber warfare skills available to the alliance to help fight hacking and electronic warfare, officials said. [Read More]
Google paid out $3.4 million for flaws reported by researchers in 2018, which brings the total awarded since the launch of its vulnerability reward program to $15 million. [Read More]
Over 5 billion records were exposed last year in 6,515 publicly disclosed data breaches, a new report from Risk Based Security reveals. [Read More]
Cybersecurity asset management company Axonius this week announced that it has raised $13 million in a Series A funding round led by Bessemer Venture Partners. [Read More]
Former Air Force intelligence officer, Monica Elfriede Witt, has been charged with providing secret U.S. information to the Iranian government. [Read More]
The ransomware market is still growing, but the number of successful ransomwares is declining, with an increasing involvement of nation-states in ransomware attacks. [Read More]
Roughly one-third of the ICS-specific vulnerability advisories published in 2018 contained basic factual errors, including when describing and rating the severity of a flaw, according to Dragos. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Grady Summers's picture
Companies in China are facing many of the same threats that your organization faces today, but they are addressing these threats at a massive scale, on emerging platforms, and with innovative approaches that we can learn from.
Stan Engelbrecht's picture
Automation tools have changed the way that security teams turn information into action, with the ability to automatically search and collect threat intelligence from a variety of third-party sources.
Ashley Arbuckle's picture
Network Segmentation can prevent lateral movement and effectively improve security, and is a continuous journey that every organization should take.
Marc Solomon's picture
The ability to customize threat intelligence scores allows you to prioritize threats to your organization and reevaluate and reprioritize as new data and context becomes available.
John Maddison's picture
Security frameworks need to see and adapt to network changes, share and correlate threat intelligence, and respond to threats as a unified system.
Preston Hogue's picture
In the United States, it is consumers’ responsibility to opt out of sharing their information with the services they join—and figuring out how to do so.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Torsten George's picture
Since multi-factor authentication requires several elements for identity verification, it’s one of the best ways to prevent unauthorized users from accessing sensitive data and moving laterally within the network.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Nick Sanna's picture
The ultimate demonstration of the value proposition of cybersecurity will come when CISOs have fully integrated their cyber risk quantification work into the organization’s enterprise risk management program.