HackDig : Dig high-quality web security articles for hacker

How to Create Value With Your (Security) Data Analytics Program

I have been fascinated by data analytics for all my professional life — from my early days of using Linux command-line tools like grep, cut, sort and unique to make sense of log files and identify the chain of events that harmed my web server, to using simple Excel and pivot tables to do pretty much the same with data of all types. Now, we have much fancier
Publish At:2020-02-10 10:40 | Read:118 | Comments:0 | Tags:Security Intelligence & Analytics Access Management Analytic

Gaining Insight Into the Ponemon Institute’s 2020 Cost of Insider Threats Report

Today, I’m pleased to share some of the key findings from the 2020 Cost of Insider Threats Global Report. This is the third benchmark study, independently sponsored by IBM Security and ObserveIT to help understand the direct and indirect costs that result from insider threats. The first study was conducted in 2016 and focused exclusively on companies i
Publish At:2020-02-09 10:30 | Read:110 | Comments:0 | Tags:CISO Security Services Access Management Breach Credentials

How Authentication and Identification Work Together to Build Digital Trust

The dictionary definition of trust, according to Merriam-Webster, is the “assured reliance on the … truth of someone or something.” In today’s digital world, trust can be a tricky concept. To do business online, whether you are a bank, retailer, insurer, airline or anything else, you must have some degree of trust in your user — trust
Publish At:2019-10-18 10:20 | Read:534 | Comments:0 | Tags:Fraud Protection Identity & Access Access Governance digital

Addressing the Clear and Present Danger of an Electrical Power Grid Breach

Power grids are a tantalizing targets for sophisticated attackers. In the U.S., every major economic sector relies heavily on electricity. That dependence includes the military as well. Given the rising threat levels, it isn’t surprising that there are calls for the Department of Defense to ends its reliance on the power grid for key military installat
Publish At:2017-10-31 05:50 | Read:2736 | Comments:0 | Tags:Energy & Utility Risk Management Access Management Energy an

Goldilocks Finds an Identity and Access Management Solution That Is Just Right

Goldie was uncomfortable. It was her first day on the new job and her desk chair was too hard. She’d ask for a softer chair later — for now she had other things on her mind. She’d been brought in to devise a new access management strategy, but the team was so strapped for time no one was available to train her. She was on her own. Goldie’s
Publish At:2017-10-23 17:50 | Read:4021 | Comments:0 | Tags:Identity & Access Topics Access Governance Access Management

The Cloud Security Risks Hidden in Plain Sight

There are two popular attitudes about cloud security, and both of them are wrong. One belief is that putting data in the cloud amounts to putting it on the public internet for anyone to access. Therefore, the only way to keep data safe is to keep it at home and out of the cloud altogether. The opposite belief is that cloud providers cover their own bases wel
Publish At:2017-09-22 13:40 | Read:3875 | Comments:0 | Tags:Cloud Security Risk Management Access Management Cloud Cloud

Risk Governance: The True Secret Weapon of Cybersecurity

This season’s featured cybersecurity nightmare may be ransomware, but breaches of all kinds are going up in both numbers and cost. In response, security vendors are offering sophisticated — and costly — solutions to defend against evermore sophisticated attackers. However, the most effective protective measures have nothing to do with specific software
Publish At:2017-09-08 10:00 | Read:4956 | Comments:0 | Tags:Risk Management Access Governance Access Management Cybercri

Seeing Data Security Breaches With Your Own Eyes

Although you can never truly predict the unexpected, most security applications attempt to do just that. They use attack models built to defend against security breaches that follow known patterns or model behaviors using a series of assumptions about exceptions. The attacks that do get through expose the uncomfortable truth that determined attackers can sur
Publish At:2017-08-10 20:40 | Read:2751 | Comments:0 | Tags:Data Protection Access Management Cost of a Data Breach Data

The Untapped Potential of Two-Factor Authentication

Remote authentication traditionally depends on two factors: something the user knows, such as a password, and something the user has, such as a hardware token. This is called two-factor authentication (2FA). In practice, something that the entity knows typically serves as the primary method of authentication. Passwords have long reigned supreme because the
Publish At:2017-08-09 10:45 | Read:3265 | Comments:0 | Tags:Identity & Access Access Management Authentication Authentic

Why Is Identity Governance So Difficult to Get Right?

When was the last time you heard an identity governance and administration (IGA) success story? If you’re thinking “not in my organization,” you’re in good company. IGA projects have a reputation for being hard to complete, drawn out and costly. But why are they so difficult to get right? Measuring the Business Value of IGA Part of th
Publish At:2017-07-31 23:40 | Read:2856 | Comments:0 | Tags:Identity & Access Access Governance Access Management Govern

IBM Named a Leader in Inaugural Gartner Magic Quadrant for Access Management, Worldwide

Gartner has named IBM a Leader in its first-ever Magic Quadrant for Access Management, Worldwide. Both IBM Security Access Manager and Cloud Identity Service were evaluated in this new report, alongside 14 other vendors. IBM was placed as a Leader for completeness of vision and ability to execute. IBM Leads the Way in Access Management According to Gartne
Publish At:2017-06-29 09:20 | Read:3763 | Comments:0 | Tags:Identity & Access Access Management Cloud Identity Service G

Digital Transformation Means Infusing Identity Everywhere

Organizations are rapidly adopting new technologies such as cloud, mobile and the Internet of Things (IoT) to facilitate and accelerate digital transformation. Securing these environments means managing identities throughout the organization, and next-generation identity and access management (IAM) strategies must give IT the ability to swiftly enable cloud,
Publish At:2017-06-14 01:00 | Read:3922 | Comments:0 | Tags:Cloud Security Identity & Access Access Management Cloud Clo

The New NIST Digital Identity Guidelines and What They Mean to You

The National Institute of Standards and Technology (NIST) recently released a draft of its Digital Identity Guidelines that included some significant and noteworthy changes. While the public comment period has closed, the document still has to go through an internal review process that is expected to last until the end of this summer. Big Changes to the NIS
Publish At:2017-06-07 21:40 | Read:3362 | Comments:0 | Tags:Identity & Access Access Management Authentication Multifact

Protect Your Twitter Account or Face Serious Security Consequences

In recent months, we have witnessed an increase in businesses making problematic social media posts. Many of the companies involved blamed the incidents on compromised social media accounts and infrastructure. McDonald’s, for example, recently blamed an incendiary tweet on cybercriminals who allegedly breached the fast food chain’s official, veri
Publish At:2017-04-17 01:45 | Read:2925 | Comments:0 | Tags:Data Protection Identity & Access Access Management Identity

Abuse of Privileges: Common Barriers to Managing Privileged Accounts

Four Common Challenges Related to Privileged Accounts What problems do you face in managing your privileged accounts? Not sure? Let’s talk about the four most common problems we hear on this topic. I am guessing that some, if not all, will sound familiar. 1. Proliferation of Shared IDs Occasionally, employees need to be given additional privileges to p
Publish At:2017-03-08 04:55 | Read:3346 | Comments:0 | Tags:Identity & Access Access Management IBM InterConnect Identit


Share high-quality web security related articles with you:)


Tag Cloud