Security Experts:

More Security Headlines

Researchers discover 125 vulnerabilities across 13 SOHO routers and NAS devices as part of a research project dubbed SOHOpelessly Broken 2.0. [Read More]
Millions of Ecuadorians are at risk of identity theft because a security breach exposed a trove of data including names, phone numbers and birth dates. [Read More]
InnfiRAT RAT can steal various types of data from infected machines, including personal data and cryptocurrency wallet information. [Read More]
Edward Snowden, the National Security Agency contractor living in Russia after leaking information about the US government's mass surveillance program, has said he would like to return home if he can get a fair trial. [Read More]
Drone strikes on Saudi oil infrastructure highlights the easy vulnerability of such facilities even as the kingdom has splurged billions on sophisticated defense hardware. [Read More]
A vulnerability recently addressed in LastPass could be abused by attackers to expose the last site credentials filled by LastPass. [Read More]
Several critical and high-severity vulnerabilities that can be exploited remotely have been found recently in widely used CODESYS industrial products. [Read More]
The question now is not whether there will be foreign attempts against the 2020 elections, but what can be done to protect the vote. [Read More]
Researchers from an Israeli threat intelligence firm SenseCy discovered a new Android RAT called MobiHok that was built using recycled source code from the MobeRat malware. [Read More]
Members of the Tor community have raised $86,081 as part of an initiative aimed at securing funds to find and squash bugs in the popular browser. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Jim Ducharme's picture
If you want to succeed with FIDO, you have to be ready. Now is the time to assess your organization’s authentication needs, how they are evolving, and the dynamics of your user population.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
Stan Engelbrecht's picture
What does the cyber kill chain have to do with Sherlock Holmes, and this quote in particular?
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Marc Solomon's picture
The security market has become confusing and it is not about the product or technology to be used; it is about solving a specific problem.
Seema Haji's picture
Security is often the first place IT and OT teams meet. There are always kinks to iron out, and ensuring a strong security posture is paramount regardless of the teams involved.
Preston Hogue's picture
The best way for the security industry to meet the challenge of modern applications and modern app development is to adopt a modern way of supporting those from a security perspective.
Barak Perelman's picture
The same cloud technology that has exposed OT networks to external threats is now providing an alternative for protecting organizations when the physical deployment of OT security equipment is not practical.
Josh Lefkowitz's picture
Many businesses either don’t have a risk appetite statement, or they have one that was developed without input and guidance on cyber risk from the CISO.