Security Experts:

More Security Headlines

In Facebook's "War Room," a nondescript space adorned with American and Brazilian flags, a team of 20 people monitors computer screens for signs of suspicious activity [Read More]
A former high school teacher was charged in an investigation into the 2014 "celebgate" scandal in which hackers obtained nude photographs and other private information from more than 200 people, including celebrities. [Read More]
Tumblr has patched a vulnerability that could have been exploited to obtain user account information, including email addresses and protected passwords [Read More]
A former Equifax manager who was put in charge of creating the equifaxsecurity2017.com website following the massive breach at the credit reporting agency has been sentenced to 8 months of home confinement for insider trading [Read More]
British Prime Minister May will call on fellow EU leaders to take united action to punish cyber attackers, warning hackers cause economic harm and undermine democracies. [Read More]
Many servers may be exposed to attacks due to an authentication bypass vulnerability affecting the libssh SSH library [Read More]
Google released Chrome 70 on Tuesday and the latest version brings updated sign-in options and patches for 23 vulnerabilities [Read More]
The maker of the LuminosityLink RAT was sentenced to 30 months in federal prison [Read More]
A cyber espionage group named GreyEnergy, linked by researchers to Russia's BlackEnergy, has been targeting energy and transportation companies in Ukraine and other countries [Read More]
WhiteSource, a company that specializes in open source security management, raises $35 million in Series C funding round [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Marc Solomon's picture
Collaboration holds the key to improved time to detection and response, so teams can better address the concerns that permeate the organization when a large-scale attack happens.
John Maddison's picture
To ensure that your existing IPS solution doesn’t become a weak link in your security strategy, you should be constantly tracking and evaluating its effectiveness—especially older, legacy solutions.
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Joshua Goldfarb's picture
What does letting go of the familiar have to do with security and what can we learn from it? I’d argue quite a bit.
Jalal Bouhdada's picture
It pays to be ahead of regulators, because if you’re aiming to be truly secure then you’ll already be meeting many of the key requirements of any local law.
Laurence Pitt's picture
By paying just a bit more attention to the permissions you are allowing on your phone or computer, you could protect yourself from a much more significant headache down the road.
Justin Fier's picture
Over time, holding people responsible will lead individuals to see how their actions impact the security of the organization and come to consider themselves responsible for the security of the company.
Josh Lefkowitz's picture
It is important to understand how the right intelligence can support network defense teams, fraud, physical security, M&A, insider threat, supply chain, and brand reputation teams, among others.
Siggi Stefnisson's picture
The truth is that quite a lot of malware is developed by an organization—an actual office of people that show up and spend their working day writing malware for a paycheck.
Alastair Paterson's picture
Although the challenge may seem insurmountable, there’s a lot that security professionals can do to mitigate insider risk.