Security Experts:

More Security Headlines

The Illinois Board of Elections hired three cybersecurity experts to watch elections and voter-data systems for irregularities. [Read More]
Researchers find critical vulnerabilities that can be exploited to take full control of D-Link routers. Serious flaws also discovered in Linksys routers [Read More]
Oracle’s October 2018 Critical Patch Update (CPU) includes 301 security fixes, bringing the total number of patches released this year to 1,119 [Read More]
VMware patches critical code execution vulnerability in the SVGA virtual graphics card used by its Workstation, ESXi and Fusion products [Read More]
Health insurer Anthem Inc. has agreed to pay the government a record $16 million to settle potential privacy violations in the biggest known health care hack in U.S. history, officials said. [Read More]
Germany-based Utimaco has received U.S. regulatory clearance for the acquisition of the Atalla product lines from Micro Focus it first announced in May 2018. The transaction is scheduled to close in November 2018. [Read More]
A newly discovered infection campaign is leveraging malicious RTF files to deliver information-stealing Trojans without being detected [Read More]
Chef Software has announced the latest version of its InSpec compliance automation platform for DevSecOps. [Read More]
The DHS ordered federal agencies to fully implement DMARC by October 16, 2018. While there has been significant progress, many agencies failed to meet the deadline [Read More]
A new iPhone passcode bypass method that works on the latest version of iOS was disclosed just days after Apple patched a similar vulnerability [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Marc Solomon's picture
Collaboration holds the key to improved time to detection and response, so teams can better address the concerns that permeate the organization when a large-scale attack happens.
John Maddison's picture
To ensure that your existing IPS solution doesn’t become a weak link in your security strategy, you should be constantly tracking and evaluating its effectiveness—especially older, legacy solutions.
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Joshua Goldfarb's picture
What does letting go of the familiar have to do with security and what can we learn from it? I’d argue quite a bit.
Jalal Bouhdada's picture
It pays to be ahead of regulators, because if you’re aiming to be truly secure then you’ll already be meeting many of the key requirements of any local law.
Laurence Pitt's picture
By paying just a bit more attention to the permissions you are allowing on your phone or computer, you could protect yourself from a much more significant headache down the road.
Justin Fier's picture
Over time, holding people responsible will lead individuals to see how their actions impact the security of the organization and come to consider themselves responsible for the security of the company.
Josh Lefkowitz's picture
It is important to understand how the right intelligence can support network defense teams, fraud, physical security, M&A, insider threat, supply chain, and brand reputation teams, among others.
Siggi Stefnisson's picture
The truth is that quite a lot of malware is developed by an organization—an actual office of people that show up and spend their working day writing malware for a paycheck.
Alastair Paterson's picture
Although the challenge may seem insurmountable, there’s a lot that security professionals can do to mitigate insider risk.