Security Experts:

More Security Headlines

A new variant of the Satan ransomware has added new exploits to its portfolio and is looking to compromise more machines by targeting additional vulnerabilities. [Read More]
Report outlines changes observed within the external security postures of political parties and organizations in the U.S. and Europe. [Read More]
Microsoft has added live response capabilities in Microsoft Defender ATP to help security teams more easily investigate incidents on remote machines. [Read More]
Identity-as-a-Service (IDaaS) company Auth0 closed a $103 million round of Series E funding led by Sapphire Ventures, at a valuation of more than $1 billion. [Read More]
Washington has warned that Chinese-made drones could be giving spy agencies in Beijing "unfettered access" to stolen data, according to a report in American media. [Read More]
Tampa Bay, FL-based security awareness and simulated phishing firm KnowBe4 has acquired Oslo, Norway-based security culture measurement company CLTRe for an undisclosed sum. [Read More]
Canadian authorities announce that Defiant Tech, the company that ran LeakedSource, pleaded guilty to trafficking identity information and possession of property obtained through crime. [Read More]
US officials delayed a ban on American technology exports to Chinese tech giant Huawei until mid-August, saying the time was needed to allow for software updates and other contractual obligations. [Read More]
As organizations migrate to Microsoft Office 365 and other cloud services, many fail to use proper configurations that ensure good security practices. [Read More]
Siemplify, a provider of security orchestration, automation and response (SOAR) tools, has secured $30 million in a Series C funding round led by Georgian Partners. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Gunter Ollmann's picture
CISOs should invest time in applying the resources of public cloud to bring automation, scalability, and AI to solving the given problem as a platform for all customers – past, present, and future.
Jalal Bouhdada's picture
By deploying robots with cybersecurity in mind we can ensure that they don’t run the danger of introducing the same negative effects into their environment.
Josh Lefkowitz's picture
it’s crucial to remember that accessing and obtaining DDW data safely and effectively in support of an intelligence operation requires highly specific skills and infrastructure that, unfortunately, not all vendors possess.
Seema Haji's picture
Failing to implement the right security controls could open the door for attacks and disruption that threatens system availability and performance — the very reasons for leveraging the power of IoT in the first place.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Barak Perelman's picture
Passive network security monitoring has its value for identifying certain indicators of compromise (IoC), but does not detect and mitigate all attacks or incidents on ICS networks.
Danelle Au's picture
Deep learning is an ideal technology to address the volume and velocity of the current threat environment, and can be used to detect a variety of different threats, even ones that seemingly look novel.
Justin Fier's picture
As innovative attacks continue to expand the purview of cyber security, helping CISOs means equipping them with equally innovative tools that stand a fighting chance.
John Maddison's picture
Enabling the networks of tomorrow requires organizations to radically reimagine the security solutions they have in place today.
Joshua Goldfarb's picture
In addition to crossword puzzles being fun, they can also help us learn a number of different information security lessons.