HackDig : Dig high-quality web security articles for hackers

Enhance Integrated Risk Management Solutions With Modern Technologies

Many business leaders struggle to efficiently respond to risk and compliance needs because of the complex regulatory landscape, ever-evolving risk scenarios and inconsistent internal processes. It’s only been more recently that organizations have embraced enterprise integrated risk management (IRM) tools to overcome a siloed approach of managing risk
Publish At:2020-07-30 15:45 | Read:228 | Comments:0 | Tags:Risk Management Artificial Intelligence (AI) Blockchain cybe

All-in-one MSS is the Future — Are You Ready?

Managed security service providers (MSSPs) can speed up detection and response capabilities in complex, distributed security environments. However, many traditional managed security providers simply act as alert factories that collect log data and spit out low-value alerts. These increase the workload on their clients’ security teams rather than offloa
Publish At:2020-07-28 17:26 | Read:286 | Comments:0 | Tags:Security Services managed detection and response (MDR) Artif

5 Core Tenets for Effective Multicloud Security

For a growing number of organizations adopting cloud-based deployment models, the cloud security challenge is clear. For example, how do I rapidly transform my business in a way that is also secure and compliant? Business leaders have an opportunity to rethink securing their enterprise during the sea-change shift toward cloud models. For instance, leade
Publish At:2020-07-24 09:11 | Read:290 | Comments:0 | Tags:Cloud Security Artificial Intelligence (AI) Cloud Hybrid Clo

A Game of Chess: Entropy and Patterns in Threat Intelligence

During a brainstorming discussion with a colleague on the value of entropy in machine learning models, specifically the models used in threat intelligence work, I mentioned that many of the threat intelligence models in use today seem to overemphasize the pattern recognition aspect of threat intelligence through the egregious use of algorithms. By contrast,
Publish At:2020-06-23 11:55 | Read:284 | Comments:0 | Tags:Artificial Intelligence Security Intelligence & Analytics Th

How Chatbots Can Help Bridge Business Continuity and Cybersecurity

A quick web search for “chatbots and security” brings up results warning you about the security risks of using these virtual agents. Dig a little deeper, however, and you’ll find that this artificial intelligence (AI) technology could actually help address many work-from-home cybersecurity challenges — such as secure end-to-end encryption a
Publish At:2020-05-24 06:18 | Read:368 | Comments:0 | Tags:Artificial Intelligence Identity & Access Risk Management Ac

Measuring the Effectiveness of AI in the SOC

In a previous blog post, I covered some of the challenges encountered by security operations centers (SOCs) and how leveraging artificial intelligence (AI) can help alleviate these challenges, including the cybersecurity skills shortage, unaddressed security risks and long dwell times. According to ISACA’s State of Cybersecurity Report, 78 percent of r
Publish At:2020-05-24 06:18 | Read:488 | Comments:0 | Tags:Artificial Intelligence Artificial Intelligence (AI) Busines

Is a Managed Security Services Provider (MSSP) Right for Your Organization?

The constantly changing threat landscape makes a robust security program a moving target. But defenders aren’t standing still — from advanced artificial intelligence (AI) to real-time threat detection and adaptive risk protection, cybersecurity services are evolving to offer IT teams the breadth of knowledge and depth of functionality they need to rall
Publish At:2020-05-03 08:13 | Read:518 | Comments:0 | Tags:Security Services Artificial Intelligence (AI) Bring-Your-Ow

Why Adversarial Examples Are Such a Dangerous Threat to Deep Learning

Technologies like artificial intelligence (AI) and neural networks are driven by deep learning — machine learning algorithms that get “smarter” with more data. The deepfake, a severe cybersecurity threat, wouldn’t be possible without deep learning. Deepfakes aside, we need to be aware that several machine learning models, including state-of
Publish At:2020-03-27 09:35 | Read:625 | Comments:0 | Tags:Artificial Intelligence Advanced Threats Artificial Intellig

Safeguarding Healthcare for the Future With Zero Trust Security

In 2019, we saw a record number of information security breaches. According to the IBM X-Force Threat Intelligence Index 2020, a total of 8.5 billion records were compromised — three times the number from 2018. The healthcare industry saw its fair share of attacks and was the 10th-most targeted industry, accounting for 3 percent of all attacks last year. Th
Publish At:2020-03-11 08:47 | Read:1080 | Comments:0 | Tags:Healthcare Identity & Access Access Management Advanced Pers

Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

Healthcare cybersecurity attacks are on the rise. As Protenus notes, industry data breaches increased by 48 percent between 2018 and 2019, with more than 41 million patient records compromised. Meanwhile, according to the 2019 HIMSS Cybersecurity Survey, 82 percent of hospitals said they suffered a “significant security incident” in the past 12 m
Publish At:2020-03-09 11:15 | Read:1066 | Comments:0 | Tags:Healthcare Risk Management Artificial Intelligence (AI) Cybe

How Human Security Investments Created a Global Culture of Accountability at ADP

Practice doesn’t necessarily make perfect, but it can lead to improvement. Quality practice is key in matters of human security, and the right quantity of practice can also make a significant difference when it comes to shifting mindsets and behavior. “Scientists believe that expert-level performance is primarily the result of expert-level practi
Publish At:2020-03-04 13:39 | Read:631 | Comments:0 | Tags:CISO Artificial Intelligence (AI) Chief Information Security

Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

The traditional threat landscape comprised of conventional IT assets is difficult enough to protect, detect and respond to, but the landscape seems to be quickly expanding beyond traditional IT. Those new domains are operational technology (OT), the internet of things (IoT) and the internet of medical things (IoMT). Devices from non-traditional IT environmen
Publish At:2020-03-04 13:39 | Read:787 | Comments:0 | Tags:Endpoint Energy & Utility Healthcare Threat Intelligence NIS

What Is Rich Communication Services? Breaking Down the Benefits and Security Risks

Texting has been around since the 1990s, and it has served us well. Users have sent countless messages, and these exchanges have facilitated such developments as SMS-based two-factor authentication (2FA) and Kenya’s SMS-based M-Pesa mobile payment system. But the world has since discovered countless other ways to message — methods that enable far more
Publish At:2020-03-03 09:50 | Read:726 | Comments:0 | Tags:Mobile Security Artificial Intelligence (AI) Authentication

A Road Map for Better Government Cybersecurity From North Dakota

Imagine the impact on the government cybersecurity landscape if the mantra for every U.S. state were something like, “Every student, every school, cyber-educated.” It’s the first I’ve heard about an objective this bold, and it comes from a state that gets little media exposure: North Dakota. The small Great Plains state has establishe
Publish At:2020-02-25 08:22 | Read:1457 | Comments:0 | Tags:Government Artificial Intelligence (AI) Cybersecurity Jobs C

The Past, Present and Future of Security Information and Event Management (SIEM)

With the release of the 2020 Gartner Magic Quadrant for Security Information and Event Management (SIEM), we feel that it is an appropriate time to reflect on the evolution of SIEM over the years. Starting out as a tool originally designed to assist organizations with compliance, SIEM evolved into an advanced threat detection system, then into an investigati
Publish At:2020-02-24 09:37 | Read:841 | Comments:0 | Tags:Incident Response Security Intelligence & Analytics Advanced

Tools

Tag Cloud