Security Experts:

More Security Headlines

NETGEAR patches DoS vulnerabilities found by Cisco researchers in its N300 series wireless routers. [Read More]
The Russian hackers behind the 2016 Crashoverride/Industroyer attack that caused a power outage in Ukraine may have been hoping to cause more serious damage. [Read More]
The attack traffic recorded by F-Secure's global network of honeypots tripled from the last six months of 2018 to the first six months of 2019. [Read More]
Wikimedia Foundation will use $2.5 million in funding received from Craig Newmark Philanthropies to improve the security of Wikipedia and other projects. [Read More]
Poland will launch a cyberspace defense force by 2024 made up of around 2,000 soldiers qualified in cybersecurity. [Read More]
The WatchBog cryptocurrency-mining botnet is heavily reliant on the Pastebin website for command and control (C&C) operations. [Read More]
Simjacker is a SIM card attack that could work against over 1 billion mobile phones, and researchers say it has already been exploited by a company to track users. [Read More]
Iran-linked threat actor COBALT DICKENS has launched a new phishing campaign targeting universities around the world. [Read More]
Cloud security firm Lacework has closed a $42 Million Series C funding round from Sutter Hill Ventures and Liberty Ventures, bringing the total raised to $74 million. [Read More]
A North Korea-linked hacker group tracked as Kimsuky and Smoke Screen has been using uncommon file formats to help their malware evade detection. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
Stan Engelbrecht's picture
What does the cyber kill chain have to do with Sherlock Holmes, and this quote in particular?
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Marc Solomon's picture
The security market has become confusing and it is not about the product or technology to be used; it is about solving a specific problem.
Seema Haji's picture
Security is often the first place IT and OT teams meet. There are always kinks to iron out, and ensuring a strong security posture is paramount regardless of the teams involved.
Preston Hogue's picture
The best way for the security industry to meet the challenge of modern applications and modern app development is to adopt a modern way of supporting those from a security perspective.
Barak Perelman's picture
The same cloud technology that has exposed OT networks to external threats is now providing an alternative for protecting organizations when the physical deployment of OT security equipment is not practical.
Josh Lefkowitz's picture
Many businesses either don’t have a risk appetite statement, or they have one that was developed without input and guidance on cyber risk from the CISO.
Torsten George's picture
A gradual improvement in cyber hygiene can go a long way toward keeping an organization immune from security infections and minimizing the risk of falling victim to a cyber-attack.