Security Experts:

More Security Headlines

ESET security researchers have discovered 12 new OpenSSH backdoor families that haven’t been documented before. [Read More]
Malware targeting macOs systems is a combination of two open-source programs, Malwarebytes security researchers warn. [Read More]
Cybersecurity experts say a newly enacted law rushed through Australia's parliament will instead be a boon to the criminal underworld by undermining the technical integrity of the internet, hurting digital security and user privacy. [Read More]
A UK teen responsible for many bomb hoaxes and DDoS attacks has been sentenced to 3 years in prison. [Read More]
The Linux.org community website was defaced after someone hacked its registrar account and hijacked DNS settings. [Read More]
Europol this week announced that 168 people were arrested in a massive operation that resulted in the identification of 1504 money mules. [Read More]
Huawei has reportedly agreed agreed to British intelligence demands over its equipment and software as it seeks to be part of the country's 5G network plans. [Read More]
A 44-year-old man from California has been sentenced to 26 months in prison for launching DDoS attacks against two astronomy websites. [Read More]
Google has launched several new features for its Google Cloud Platform (GCP) customers, as part of the beta release of its Cloud Security Command Center (Cloud SCC). [Read More]
The European Union and its citizens should be "worried" about telecoms giant Huawei and other Chinese firms that cooperate with Beijing's intelligence services, official warns. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Mike Fleck's picture
A small business with one running all of IT, cannot defend against cyber-attacks from the North Korean military with the same vigor as Lockheed Martin or Northrup Grumman.
Marc Solomon's picture
Adversaries are increasingly masterful at taking advantage of these seams between technologies and teams to infiltrate organizations and remain below the radar.
John Maddison's picture
There are three basic security components that every organization with an open BYOD strategy needs to be familiar with.
Ashley Arbuckle's picture
Whatever form your move to the cloud takes, you need the right technologies and talent in place to ensure a secure transition.
Torsten George's picture
Like the NIST Cybersecurity Framework, it integrates relevant regulations (e.g., HIPAA) and standards (NIST 800-53, ISO 27001, PCI DSS) into a single overarching security framework.
Preston Hogue's picture
It’s a good reminder that communications in cyberspace can have a long shelf life that both individuals and organizations would be wise to consider.
Galina Antova's picture
From a communications and technical standpoint, the Onslow Water and Sewer Authority (ONWASA) turned a malicious cyber incident into a strong success story on many fronts.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Lance Cottrell's picture
If strategic thinking, introspection, re-focusing, and hard truths sound worth the effort, the next question is how to make sure you get that value from your Security Advisory Board (SAB).
Laurence Pitt's picture
ePrivacy takes GDPR's approach a step further by ensuring personal and family privacy in relation to data collection, storage and usage.