Security Experts:

More Security Headlines

A UK teen responsible for many bomb hoaxes and DDoS attacks has been sentenced to 3 years in prison. [Read More]
The Linux.org community website was defaced after someone hacked its registrar account and hijacked DNS settings. [Read More]
Europol this week announced that 168 people were arrested in a massive operation that resulted in the identification of 1504 money mules. [Read More]
Huawei has reportedly agreed agreed to British intelligence demands over its equipment and software as it seeks to be part of the country's 5G network plans. [Read More]
A 44-year-old man from California has been sentenced to 26 months in prison for launching DDoS attacks against two astronomy websites. [Read More]
Google has launched several new features for its Google Cloud Platform (GCP) customers, as part of the beta release of its Cloud Security Command Center (Cloud SCC). [Read More]
The European Union and its citizens should be "worried" about telecoms giant Huawei and other Chinese firms that cooperate with Beijing's intelligence services, official warns. [Read More]
A security research project called DeepPhish examined the extent to which ML technologies can genuinely aid in the detection of phishing, and the extent to which those same technologies could be used by cybercriminals to by-pass anti-phishing defenses. [Read More]
Remotely exploitable DoS vulnerability found in some of Rockwell Automation’s MicroLogix controllers and ControlLogix communications modules. [Read More]
A threat group possibly originating from North Korea has been targeting academic institutions since at least May this year, NetScout’s security researchers reveal. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Lance Cottrell's picture
It is important to take a systematic approach to creating your Security Advisory Board (SAB). Don’t just invite the smartest, most famous people you happen to know and like.
John Maddison's picture
Organizations need to anticipate threats and target the economic motivations of cybercriminals in order to force them back to the drawing board.
Marc Solomon's picture
How do we break this wasteful cycle and enable teams and technologies to reduce instances of false positives? The answer lies in prioritization and learning.
Ashley Arbuckle's picture
Ashley Arbuckle interviews Michelle Dennedy, Cisco’s Chief Privacy Officer (CPO), to discuss how data privacy has a major impact on business.
Marie Hattar's picture
In the ever more complicated world of modern IT networks, visibility is the increasingly pressing challenge that security teams need to solve to stop cyber attacks.
Josh Lefkowitz's picture
It’s relatively commonplace for CTI and incident response teams to establish a coordinated response plan in preparation for a cyber attack, but—as demonstrated by WannaCry—it’s imperative for physical security teams to be involved in such plans as well.
Stan Engelbrecht's picture
By highlighting phishing, which causes so many headaches for all us security professionals, you can see just how much of a game-changer automation can be for any SOC or CSIRT.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
Joshua Goldfarb's picture
Organizations need to continually evaluate where each effort stands in relation to its allotted budget and schedule, along with the value it brings to the organization’s security posture.
Mike Fleck's picture
A small business with one running all of IT, cannot defend against cyber-attacks from the North Korean military with the same vigor as Lockheed Martin or Northrup Grumman.