Security Experts:

More Security Headlines

New report from CyberX shows that plaintext passwords, direct connections to the Internet, the lack of automated updates for antiviruses, and outdated operating systems often put industrial systems at risk of attacks [Read More]
SecurityWeek examines the rise of virtual security officers, the role of virtual security officers, and navigating the choice of a virtual officer. [Read More]
Japanese government orders Facebook to improve protection of users' personal information following data breaches affecting tens of millions of people worldwide [Read More]
Cisco and F5 Networks are investigating the possible impact of the recently patched libssh vulnerability on their products, while other vendors have concluded similar investigations [Read More]
A code execution vulnerability in the LIVE555 Streaming Media library impacts VLC, MPlayer and other applications [Read More]
A website for a Saudi investment summit was down on Monday after an apparent cyber attack, just a day before the three-day conference overshadowed by the murder of journalist Jamal Khashoggi begins [Read More]
The consensus among security experts is that electronic voting is not currently secure -- but there is no reason that it could not be made as secure as any other computer-based system. more effort and expenditure [Read More]
Patch for a recently disclosed XSS vulnerability in introduced another similar flaw [Read More]
Cyberbit launches SCADAScan, a portable solution for assessing the security of ICS/SCADA networks [Read More]
Google further improves Android security with new Protected Confirmation API [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Laurence Pitt's picture
The biggest truth about security in public cloud is that it provides security at scale. As a single organization, everything you do is at a scale of one.
Mike Fleck's picture
Enterprises need proactive and automated checks and balances on cloud access management and information sharing.
Josh Lefkowitz's picture
Evaluating a threat intelligence vendor’s collection strategy effectively is a complex process that requires far more than simply obtaining the answers to the questions outlined above.
Stan Engelbrecht's picture
These seven processes should be automated in order to save valuable time during incident response and security investigation procedures, and help organizations improve their overall cybersecurity posture.
Siggi Stefnisson's picture
If I have one wish for ‘Cybersecurity Awareness Month,’ it’s that we all need to be aware of the need for innovative responses on the part of the security industry, to counter a threat industry which is innovating both technical and business models at a rapid pace.
Alastair Paterson's picture
Encouraging and supporting diversity and inclusion in the workforce will allow us to overcome the cybersecurity workforce gap now estimated to reach 1.8 million by 2022.
Preston Hogue's picture
Technical hacks to gain entry into sensitive systems are still an important part of the equation, but today they are just one tool in a much larger toolkit.
Ashley Arbuckle's picture
Customer Experience (CX) is becoming a key driver of success in the security industry, not just for companies that deliver superior customer experiences but – more importantly – for the organizations and security professionals they serve.
Devon Kerr's picture
If phishing attacks slip past the first line of defense, security teams need to be able to identify suspicious activity and stop it before hackers can learn enough about their enterprise to execute a full attack.
Lance Cottrell's picture
Studying the DNC Hacker case shows just how difficult it is to maintain a false identity in the face of a highly resourced and motivated opponent.