Security Experts:

More Security Headlines

Vulnerabilities found in the Android camera apps provided by Google and Samsung could have been exploited by hackers to spy on users. [Read More]
Adobe informs users that support for Acrobat 2015 and Reader 2015 will end on April 7, 2020, which means the products will no longer receive security updates. [Read More]
Louisiana governor reveals that a ransomware attack hit state servers, prompting a response from the state’s cyber-security team. [Read More]
Macy’s informs customers that the checkout and wallet pages on its official website hosted a payment card skimmer between October 7 and October 15. [Read More]
A US congressional committee on Monday asked for a briefing on a Google project to modernize healthcare while giving the internet titan access to millions of people's medical data. [Read More]
It took ABB five years to inform customers of a critical vulnerability affecting one of its plant historian products and the researcher who found it believes threat actors may have known about the flaw. [Read More]
Popular password manager 1Password has closed a $200 million Series A round, which the company says is the first outside investment following 14 years of growth and profitability. [Read More]
A 20-year-old Cypriot wanted for hacking offences in the United States is set to be the country's first citizen to be extradited there. [Read More]
An Illinois man was sentenced to 13 months in prison for his role as administrator of stresser services that launched millions of distributed denial-of-service (DDoS) attacks. [Read More]
A major exercise whose goal was to test the cyber and physical security of North America’s grid has enabled the energy industry and governments to review and improve incident response plans and collaboration. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Barak Perelman's picture
While pharmaceutical operations networks were once siloed, today their connection to IT and anywhere access has created an environment that threatens the integrity of drug formulation control systems.
Marie Hattar's picture
The solution: every week, devote at least two hours to basic cyber hygiene. Four best practices will help your team build habit from repetition.
Laurence Pitt's picture
Adoption of 5G not only exposes potential new attack surfaces, but given execution happens at super-speed, it also changes the required nature of any defense.
Joshua Goldfarb's picture
Security metrics is a topic that, while challenging, is also important and at the top of the priority list for security organizations. Here are five tips for leveraging security metrics to keep your organization out of the lion’s den.
Craig Harber's picture
As long as organizations continue to employ simplistic “set it and forget it” security approaches, they will be forced into playing reactive, catch-up defense against cyber attackers.
Fred Kneip's picture
Employing a third party adds risk, especially if that company is given some level of access to network and computing resources, or is asked to handle and protect critical or proprietary information.
Marc Solomon's picture
National Cybersecurity Awareness Month (NCSAM) is a great vehicle to raise awareness for cybersecurity and to remind every organization that the ability to improve security operations begins with contextual awareness.
John Maddison's picture
A single, cross-platform security strategy ensures that your cloud security deployment doesn’t replicate the challenges of complexity, siloed solutions, and solution sprawl faced in traditional network security environments.
Josh Lefkowitz's picture
Here’s a crash-course on the intelligence cycle and how you can apply and derive value from its core principles—no matter your role or security discipline:
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.