Security Experts:

More Security Headlines

MITRE this week published an updated list of the 25 most dangerous software weaknesses and vulnerabilities. [Read More]
Cambridge, UK-based Dataswift has raised nearly $2 million to support its mission to revolutionize personal data sharing. [Read More]
Kaspersky announces the ICS Vulnerabilities Database, a new service that provides information on vulnerabilities in ICS/IIoT products and ICS threat signatures. [Read More]
Harbor registries with default settings are impacted by a vulnerability that allows any user to elevate privileges to administrator. [Read More]
A Magecart threat actor has compromised the websites of two hotel chains to inject scripts targeting Android and iOS users. [Read More]
Microsoft has rushed to fix a bug that prevented users from running a quick scan or a full system scan with Windows Defender. [Read More]
Ping Identity, which starts trading on the New York Stock Exchange on September 19 under PING, priced its shares at $15 and it hopes to raise at least $187 million. [Read More]
The Smominru botnet continues to spread at a fast pace, infecting around 4,700 new hosts daily during the month of August. [Read More]
Facebook chief executive Mark Zuckerberg was expected in Washington Thursday for private talks with policymakers as the leading social network faces a myriad of regulatory and legal issues. [Read More]
Cybersecurity firm Acronis becomes a unicorn company after raising $147 million in a funding round led by Goldman Sachs. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Laurence Pitt's picture
Black Hat 2019 recently wrapped in Las Vegas, where somewhere between 15,000 and 20,000 experts descended to experience the latest developments in the world of cybersecurity.
Jim Ducharme's picture
If you want to succeed with FIDO, you have to be ready. Now is the time to assess your organization’s authentication needs, how they are evolving, and the dynamics of your user population.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
Stan Engelbrecht's picture
What does the cyber kill chain have to do with Sherlock Holmes, and this quote in particular?
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Marc Solomon's picture
The security market has become confusing and it is not about the product or technology to be used; it is about solving a specific problem.
Seema Haji's picture
Security is often the first place IT and OT teams meet. There are always kinks to iron out, and ensuring a strong security posture is paramount regardless of the teams involved.
Preston Hogue's picture
The best way for the security industry to meet the challenge of modern applications and modern app development is to adopt a modern way of supporting those from a security perspective.
Barak Perelman's picture
The same cloud technology that has exposed OT networks to external threats is now providing an alternative for protecting organizations when the physical deployment of OT security equipment is not practical.