HackDig : Dig high-quality web security articles for hacker

Addressing the Clear and Present Danger of an Electrical Power Grid Breach

Power grids are a tantalizing targets for sophisticated attackers. In the U.S., every major economic sector relies heavily on electricity. That dependence includes the military as well. Given the rising threat levels, it isn’t surprising that there are calls for the Department of Defense to ends its reliance on the power grid for key military installat
Publish At:2017-10-31 05:50 | Read:166 | Comments:0 | Tags:Energy & Utility Risk Management Access Management Energy an

Goldilocks Finds an Identity and Access Management Solution That Is Just Right

Goldie was uncomfortable. It was her first day on the new job and her desk chair was too hard. She’d ask for a softer chair later — for now she had other things on her mind. She’d been brought in to devise a new access management strategy, but the team was so strapped for time no one was available to train her. She was on her own. Goldie’s
Publish At:2017-10-23 17:50 | Read:157 | Comments:0 | Tags:Identity & Access Topics Access Governance Access Management

The Cloud Security Risks Hidden in Plain Sight

There are two popular attitudes about cloud security, and both of them are wrong. One belief is that putting data in the cloud amounts to putting it on the public internet for anyone to access. Therefore, the only way to keep data safe is to keep it at home and out of the cloud altogether. The opposite belief is that cloud providers cover their own bases wel
Publish At:2017-09-22 13:40 | Read:300 | Comments:0 | Tags:Cloud Security Risk Management Access Management Cloud Cloud

Risk Governance: The True Secret Weapon of Cybersecurity

This season’s featured cybersecurity nightmare may be ransomware, but breaches of all kinds are going up in both numbers and cost. In response, security vendors are offering sophisticated — and costly — solutions to defend against evermore sophisticated attackers. However, the most effective protective measures have nothing to do with specific software
Publish At:2017-09-08 10:00 | Read:369 | Comments:0 | Tags:Risk Management Access Governance Access Management Cybercri

Seeing Data Security Breaches With Your Own Eyes

Although you can never truly predict the unexpected, most security applications attempt to do just that. They use attack models built to defend against security breaches that follow known patterns or model behaviors using a series of assumptions about exceptions. The attacks that do get through expose the uncomfortable truth that determined attackers can sur
Publish At:2017-08-10 20:40 | Read:352 | Comments:0 | Tags:Data Protection Access Management Cost of a Data Breach Data

The Untapped Potential of Two-Factor Authentication

Remote authentication traditionally depends on two factors: something the user knows, such as a password, and something the user has, such as a hardware token. This is called two-factor authentication (2FA). In practice, something that the entity knows typically serves as the primary method of authentication. Passwords have long reigned supreme because the
Publish At:2017-08-09 10:45 | Read:222 | Comments:0 | Tags:Identity & Access Access Management Authentication Authentic

Why Is Identity Governance So Difficult to Get Right?

When was the last time you heard an identity governance and administration (IGA) success story? If you’re thinking “not in my organization,” you’re in good company. IGA projects have a reputation for being hard to complete, drawn out and costly. But why are they so difficult to get right? Measuring the Business Value of IGA Part of th
Publish At:2017-07-31 23:40 | Read:359 | Comments:0 | Tags:Identity & Access Access Governance Access Management Govern

IBM Named a Leader in Inaugural Gartner Magic Quadrant for Access Management, Worldwide

Gartner has named IBM a Leader in its first-ever Magic Quadrant for Access Management, Worldwide. Both IBM Security Access Manager and Cloud Identity Service were evaluated in this new report, alongside 14 other vendors. IBM was placed as a Leader for completeness of vision and ability to execute. IBM Leads the Way in Access Management According to Gartne
Publish At:2017-06-29 09:20 | Read:480 | Comments:0 | Tags:Identity & Access Access Management Cloud Identity Service G

Digital Transformation Means Infusing Identity Everywhere

Organizations are rapidly adopting new technologies such as cloud, mobile and the Internet of Things (IoT) to facilitate and accelerate digital transformation. Securing these environments means managing identities throughout the organization, and next-generation identity and access management (IAM) strategies must give IT the ability to swiftly enable cloud,
Publish At:2017-06-14 01:00 | Read:577 | Comments:0 | Tags:Cloud Security Identity & Access Access Management Cloud Clo

The New NIST Digital Identity Guidelines and What They Mean to You

The National Institute of Standards and Technology (NIST) recently released a draft of its Digital Identity Guidelines that included some significant and noteworthy changes. While the public comment period has closed, the document still has to go through an internal review process that is expected to last until the end of this summer. Big Changes to the NIS
Publish At:2017-06-07 21:40 | Read:414 | Comments:0 | Tags:Identity & Access Access Management Authentication Multifact

Protect Your Twitter Account or Face Serious Security Consequences

In recent months, we have witnessed an increase in businesses making problematic social media posts. Many of the companies involved blamed the incidents on compromised social media accounts and infrastructure. McDonald’s, for example, recently blamed an incendiary tweet on cybercriminals who allegedly breached the fast food chain’s official, veri
Publish At:2017-04-17 01:45 | Read:502 | Comments:0 | Tags:Data Protection Identity & Access Access Management Identity

Abuse of Privileges: Common Barriers to Managing Privileged Accounts

Four Common Challenges Related to Privileged Accounts What problems do you face in managing your privileged accounts? Not sure? Let’s talk about the four most common problems we hear on this topic. I am guessing that some, if not all, will sound familiar. 1. Proliferation of Shared IDs Occasionally, employees need to be given additional privileges to p
Publish At:2017-03-08 04:55 | Read:502 | Comments:0 | Tags:Identity & Access Access Management IBM InterConnect Identit

The Zero Trust Model for Living in a Hacked World

Although data breaches happen to corporations, the impact ultimately affects normal citizens like you and me. When we fall victim to credit card breaches, the associated anxiety and uncertainty is not addressed beyond proffered, free credit watch and protection services. Our personal email accounts are also at risk of misuse. According to CNN, a recent call
Publish At:2017-02-03 15:20 | Read:725 | Comments:0 | Tags:Identity & Access Network & Endpoint Access Management Cloud

The Holes in Your Knows

I have some, you have some — we all have some holes in our knows. As security professionals, we are often reluctant to admit it. The Dunning-Kruger effect states that the less you know about a subject, the more you are unaware of your lack of knowledge. But by the time we gain expert security knowledge, we are more aware of the unknowns. Filling the Holes in
Publish At:2017-01-16 23:40 | Read:1103 | Comments:0 | Tags:Security Intelligence & Analytics Access Management Best Pra

IP Theft: How Often Does Your IP Walk Out the Door?

It happens — employees leave. Sometimes they find growth opportunities and are encouraged, even cheered, by their employers to go for it. Other times, they are let go due to downsizing or performance issues, recruited by rivals or otherwise lured to greener pastures. In all scenarios, the employer’s intellectual property (IP) is at risk. Revenge, greed
Publish At:2017-01-12 09:10 | Read:1146 | Comments:0 | Tags:CISO Identity & Access Access Management Data Protection Dat

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud