Security Experts:

More Security Headlines

Several vulnerabilities affecting the Phoenix Contact Automationworx automation software suite can be exploited for remote code execution using specially crafted project files. [Read More]
VideoLAN has addressed a critical double-free vulnerability in the VLC media player that could allow an attacker to execute arbitrary code on target systems. [Read More]
Protection against Spectre, Meltdown, RAMBleed, Rowhammer and other memory side-channel attacks has been added to OpenSSH. [Read More]
Real-time application behavior analytics, control, and protection provider TrueFort has raised $13.7 million in a Series A funding round. [Read More]
A recently discovered malicious campaign is aiming at infecting victim machines by delivering the notorious FlawedAmmyy RAT directly in memory, Microsoft warns. [Read More]
Iran claims no cyber attack against the Islamic republic has ever succeeded, after American media reported the US launched one last week amid a standoff between the two countries. [Read More]
Researcher conducts detailed analysis of the two pieces of Mac malware delivered recently via Firefox zero-day vulnerabilities to cryptocurrency exchanges. [Read More]
File transfer service WeTransfer alerts users after discovering that some file transfer emails were sent to the wrong individuals. [Read More]
A former congressional staffer was sentenced to four years in prison Wednesday after pleading guilty to illegally posting online the home addresses and telephone numbers of five Republican senators who backed Brett Kavanaugh’s Supreme Court nomination. [Read More]
U.S. military cyber forces launched a strike against Iranian military computer systems on as President Donald Trump backed away from plans for a more conventional military strike in response to Iran's downing of a U.S. surveillance drone, U.S. officials said. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Devon Kerr's picture
How healthcare organizations used a trail of digital evidence to identify the type of attack they were experiencing and developed a remediation strategy.
Barak Perelman's picture
Since Building Management Systems (BMS) are integrated with and interconnected to both hardwired and cloud based solutions, as well as third party applications, their attack surface is large and getting larger.
Alastair Paterson's picture
Diversity of thought fosters psychological safety, which is a shared belief among teams that they perceive they are safe to take risks, and is one of the core indicators of highly effective teams.
Jim Gordon's picture
While I have blogged pretty frequently in the past, this is my first official column for any sort of major publication, and I am grateful for the opportunity from SecurityWeek.
Marc Solomon's picture
Security teams should be able to detect threats faster and use that knowledge to pivot and accelerate parallel investigations that are separate but related.
Torsten George's picture
Companies should consider moving to a Zero Trust approach, powered by additional security measures such as multi-factor authentication, to stay ahead of the security curve and leave passwords behind for good.
Ashley Arbuckle's picture
The convergence of security products and services is a welcomed development and will lead to improved security.
Laurence Pitt's picture
“The Cloud Wars” may be dominating IT news headlines, but what does this phrase actually mean? And is it something that an enterprise needs to be concerned with?
Joshua Goldfarb's picture
Five examples of how insecurity can actually help bolster a security program by allowing an organization to continually learn and make changes, thus improving.
Gunter Ollmann's picture
To the surprise of many, public cloud appears to be driving a renaissance in adoption and advancement of managed security service providers (MSSP).