Security Experts:

More Security Headlines

Cyberbit launches SCADAScan, a portable solution for assessing the security of ICS/SCADA networks [Read More]
Google further improves Android security with new Protected Confirmation API [Read More]
A government computer system that interacts with HealthCare.gov was hacked earlier this month, compromising the sensitive personal data of some 75,000 people, officials said. [Read More]
Kaspersky Lab researchers have analyzed DarkPulsar, another exploit supposedly stolen from the NSA-linked Equation Group [Read More]
Thousands of projects are possibly impacted by a jQuery File Upload plugin vulnerability that has been actively exploited in the wild [Read More]
The city of West Haven Connecticut has paid $2,000 to restore access to its computer system after a ransomware attack. [Read More]
A China-linked cyber espionage group known as Tick was observed using the Datper malware in a recent campaign [Read More]
The Indiana National Guard says a state, non-military computer server containing personal information on civilian and military Guard personnel was the target of a recent ransomware attack. [Read More]
Over a dozen vulnerabilities, including remote code execution and DoS flaws, have been found in FreeRTOS. The microcontroller OS is used for consumer products, B2B solutions and industrial automation [Read More]
EU leaders on Thursday condemned the attempted hack on the global chemical weapons watchdog and vowed to step up the bloc's efforts to tackle cyber attacks [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Laurence Pitt's picture
The biggest truth about security in public cloud is that it provides security at scale. As a single organization, everything you do is at a scale of one.
Mike Fleck's picture
Enterprises need proactive and automated checks and balances on cloud access management and information sharing.
Josh Lefkowitz's picture
Evaluating a threat intelligence vendor’s collection strategy effectively is a complex process that requires far more than simply obtaining the answers to the questions outlined above.
Stan Engelbrecht's picture
These seven processes should be automated in order to save valuable time during incident response and security investigation procedures, and help organizations improve their overall cybersecurity posture.
Siggi Stefnisson's picture
If I have one wish for ‘Cybersecurity Awareness Month,’ it’s that we all need to be aware of the need for innovative responses on the part of the security industry, to counter a threat industry which is innovating both technical and business models at a rapid pace.
Alastair Paterson's picture
Encouraging and supporting diversity and inclusion in the workforce will allow us to overcome the cybersecurity workforce gap now estimated to reach 1.8 million by 2022.
Preston Hogue's picture
Technical hacks to gain entry into sensitive systems are still an important part of the equation, but today they are just one tool in a much larger toolkit.
Ashley Arbuckle's picture
Customer Experience (CX) is becoming a key driver of success in the security industry, not just for companies that deliver superior customer experiences but – more importantly – for the organizations and security professionals they serve.
Devon Kerr's picture
If phishing attacks slip past the first line of defense, security teams need to be able to identify suspicious activity and stop it before hackers can learn enough about their enterprise to execute a full attack.
Lance Cottrell's picture
Studying the DNC Hacker case shows just how difficult it is to maintain a false identity in the face of a highly resourced and motivated opponent.