Security Experts:

More Security Headlines

Russia-linked threat group Turla has released new variants of the KopiLuwak Trojan in attacks detected since the beginning of this year, Kaspersky’s security researchers reveal. [Read More]
Of 4,000 software professionals surveyed by GitLab, 69% of developers are aware they’re expected to write secure code, but nearly half of security pros say it’s hard to get developers to make vulnerability remediation a priority. [Read More]
Symantec shares dropped over 10 percent on Monday following reports that the company’s acquisition talks with Broadcom have stalled due to disagreement over price. [Read More]
Many U.S. counties are buying new electoral systems, but they still run on old software that will soon be outdated and more vulnerable to hackers. [Read More]
Many companies are still failing at the basics of cyber security, and too often, organizations fail to accurately monitor all their assets. [Read More]
A researcher earned $10,000 from Tesla after discovering a stored XSS vulnerability that could have been exploited to obtain (and possibly modify) vehicle information. [Read More]
Members of the cybercriminal group behind the infamous Dridex Trojan have split from the gang and released a forked version of the BitPaymer ransomware, CrowdStrike reports. [Read More]
Clemson and other universities are working to improve cybersecurity. [Read More]
LaPorte County in Indiana paid a ransom of over $130,000 demanded by cybercriminals who managed to infect its systems with a piece of ransomware. [Read More]
A researcher received $30,000 from Facebook after discovering a vulnerability that could have been exploited to hack Instagram accounts. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Jim Gordon's picture
Intel's Jim Gordon explains how he set an example as one of a small handful of “male majority” leaders to help advance Diversity and Inclusion (D&I) efforts.
Ashley Arbuckle's picture
Shifting to a proactive approach to incident response (IR) is critical but identifying partners who can provide the capabilities you need is a challenging task.
Laurence Pitt's picture
While security spending is on the increase, it’s up to us as experienced security practitioners to make the most of this spend with a clear ROI that can be reported to the business.
Alastair Paterson's picture
If it takes a whole village to raise a child, it takes a whole community of vendors and business partners to build a secure data environment.
Preston Hogue's picture
ChatOps offers a bridge to a fully realized vision for DevSecOps, offering a much quicker path to resolution for both security and non-security issues.
Marc Solomon's picture
We can make the Security Operations Center (SOC) a powerhouse by tearing down walls between the various security groups in an organization.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Josh Lefkowitz's picture
Regardless of which framework you use, it’s crucial to operationalize it in the context of your organization’s unique environment and risk factors.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Joshua Goldfarb's picture
Wild salmon face predators, such as grizzly bears, bald eagles, and sport fishermen. And yet, through it all, they remain focused on returning “with uncanny precision to the natal river where they were born.”