Security Experts:

More Security Headlines

Facebook said it will have a "war room" up and running on its Silicon Valley campus to quickly repel efforts to use the social network to meddle in upcoming elections. [Read More]
DMARC has been fully implemented on two thirds of U.S. government domains, but there’s less than a month until all domains should be compliant with BOD 18-01 [Read More]
Rockwell Automation patches several critical and high severity vulnerabilities that allow DoS attacks and possibly code execution in RSLinx Classic communications software [Read More]
The United States is taking off the gloves in the growing, shadowy cyber war waged with China, Russia and other rivals, National Security Advisor John Bolton said. [Read More]
BGP (Border Gateway Protocol) routing isn’t secure and organizations should embrace Resource Public Key Infrastructure (RPKI) to improve security, Cloudflare says. [Read More]
Cisco has patched vulnerabilities in the Webex Network Recording Player for Advanced Recording Format (ARF) that could allow a remote attacker to execute arbitrary code on a targeted system. [Read More]
Rapid7 adds automation and orchestration capabilities to its Insight Platform, and new automation functionality to vulnerability management and incident response tools [Read More]
Cybercriminals are targeting the online payroll accounts of employees in a variety of industries to divert funds, the FBI warns. [Read More]
Hackers have stolen 6.7 billion yen ($60 million) worth of cryptocurrencies from Japanese Zaif digital currency exchange, the operators said. [Read More]
Shanghai police have arrested a man in connection with a data leak at NASDAQ-listed Chinese hotelier Huazhu Group after the suspect failed to sell the information online. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Siggi Stefnisson's picture
The truth is that quite a lot of malware is developed by an organization—an actual office of people that show up and spend their working day writing malware for a paycheck.
Alastair Paterson's picture
Although the challenge may seem insurmountable, there’s a lot that security professionals can do to mitigate insider risk.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Galina Antova's picture
The most successful organizations will be the ones that look at cyber risk holistically and build bridges between the IT, OT, and Security organizations.
Nick Sanna's picture
Cyber risk has risen to the level of enterprise risk – which they expect to be measured, managed, and reported in the terms that the rest of the enterprise understands.
Marie Hattar's picture
Cybersecurity teams need to adopt an adversarial mindset and understand what their enemies are capable of and prepare an appropriate response.
Marc Solomon's picture
ThreatQuotient's Marc Solomon talks with Glen Jones, senior director of Identity and Risk Products at Visa, to discuss on cyber threat and payment card data protection.
John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Ashley Arbuckle's picture
Through security orchestration and automation, you can gather threat intelligence from the cloud, translate it into a useable format and create new blacklists.
Torsten George's picture
Solving the security challenges healthcare providers face will fuel faster growth, enable further digital transformation, and ultimately result in enhanced patient care and data protection.