Security Experts:

More Security Headlines

Eight of the top ten most exploited vulnerabilities in 2018 affected Microsoft products, according Recorded Future's Cyber Threat Analysis. [Read More]
A security researcher working with Google Project Zero has discovered a novel bug class that impacts Windows and some of its drivers. [Read More]
Norwegian metals and energy giant Norsk Hydro has been hit by a serious ransomware attack that impacted operations, forcing the company to resort to manual processes. [Read More]
One of the world's biggest aluminium producers, Norway's Norsk Hydro, has been hit by an "extensive cyberattack" that impacted operations. [Read More]
Google has released its Sandboxed API as open source to make it easier for software developers to create secure products. [Read More]
A new variant of the Mirai botnet is targeting IoT devices specifically intended for businesses, potentially signaling a focus toward enterprise. [Read More]
Slack launches Enterprise Key Management, an Enterprise Grid add-on feature that gives organizations total control over their encryption keys. [Read More]
Scammers are trying to cash in on the Christchurch mosque massacres, using phishing emails with links to fake bank accounts to ensnare people keen to donate, New Zealand's cyber security body said Monday. [Read More]
Android Q brings more control over location access, improved transparency, and better data security (many of the enhancements are part of Google’s Project Strobe). [Read More]
EU adopts Law Enforcement Emergency Response Protocol for major cross-border cyberattacks. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Gunter Ollmann's picture
DLP has always been tricky to deploy and enforce, and most CISOs can freely regale stories of DLP promises and their subsequent failures.
Josh Lefkowitz's picture
The best way for intelligence practitioners to identify what types of context their intelligence consumers truly need is simply to ask them.
Ellison Anne Williams's picture
Data protection schemes must recognize and secure data as it exists at all points in the processing lifecycle, whether at rest, in transit, or in use.
Torsten George's picture
By implementing the core pillars of GDPR, organizations can assure they meet the mandate’s requirements while strengthening their cyber security posture.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Preston Hogue's picture
You should be asking yourself what your digital vapor trail says about you and its potential impact on your own reputation and the trust others have in you.
Alastair Paterson's picture
By understanding where assets are exposed, their value to attackers, and how attackers target this data, organizations can make better decisions about their defenses and improve them over time.
Grady Summers's picture
There are many pitfalls, and some simple rules that can help you make smarter decisions if you are in looking to purchase security products seen at RSA Conference.
Marc Solomon's picture
As a security professional, wouldn’t it be great to be able to focus on one thing at a time and know you’re focused on the right things to protect the organization?
Ashley Arbuckle's picture
Through market consolidation, organizations can derive exponentially more value from their security tools.