HackDig : Dig high-quality web security articles for hackers

The 2020 Cyber Resilient Organization: Preparation and Technology Differentiate High Performers

The Ponemon Institute just released its annual “The Cyber Resilient Organization” report, sponsored by IBM Security. In its fifth year, this study takes an in-depth look at organizations’ ability to prevent, detect, contain and respond to cyberattacks. The report examines changes in cyber resilience and identifies approaches and best practices organizations
Publish At:2020-06-29 18:30 | Read:177 | Comments:0 | Tags:CISO Incident Response Application Security Automation Cloud

The best test for an EDR solution is one that works for you

Since its inception, the endpoint detection and response (EDR) market has evolved rapidly with new innovations to better address the cyber landscape and meet customers’ needs for an effective and simple solution that just works. But finding something that just works means something quite different for every business, depending on their size, security expe
Publish At:2020-05-28 16:55 | Read:188 | Comments:0 | Tags:Awareness Explained Opinion Security world alert fatigue aut

Why Security Orchestration, Automation and Response (SOAR) Is Fundamental to a Security Platform

Security teams today are facing increased challenges due to the “new normal” created by the recent global health crisis. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees must move to a virtual security operations center (SOC) model while address
Publish At:2020-05-24 06:18 | Read:227 | Comments:0 | Tags:CISO Cloud Security Incident Response Automation Cloud Servi

Gain Visibility Into Operational Technology (OT) Environments With a Combined SOC

Operational technology (OT) encompasses many aspects of our world, including industrial control systems (ICS) that are used to control core operational processes. ICS technologies often control essential services such as water and power supply and are also used to monitor these services to prevent hazardous conditions. Manipulation of these systems and proce
Publish At:2020-05-03 08:13 | Read:352 | Comments:0 | Tags:Energy & Utility Security Intelligence & Analytics Security

Extend Your Incident Response Program to DevOps With Security Automation

One of the biggest challenges facing security teams when it comes to incident response is complexity. The continual growth in volume and severity of cyberattacks has led to increased business process and technical complexity as different threat vectors have required security leaders to purchase point solutions with unique user interfaces, custom APIs and bus
Publish At:2020-04-15 07:54 | Read:477 | Comments:0 | Tags:Incident Response Automation Collaboration Data Breaches Dev

Why Adversarial Examples Are Such a Dangerous Threat to Deep Learning

Technologies like artificial intelligence (AI) and neural networks are driven by deep learning — machine learning algorithms that get “smarter” with more data. The deepfake, a severe cybersecurity threat, wouldn’t be possible without deep learning. Deepfakes aside, we need to be aware that several machine learning models, including state-of
Publish At:2020-03-27 09:35 | Read:482 | Comments:0 | Tags:Artificial Intelligence Advanced Threats Artificial Intellig

Safeguarding Healthcare for the Future With Zero Trust Security

In 2019, we saw a record number of information security breaches. According to the IBM X-Force Threat Intelligence Index 2020, a total of 8.5 billion records were compromised — three times the number from 2018. The healthcare industry saw its fair share of attacks and was the 10th-most targeted industry, accounting for 3 percent of all attacks last year. Th
Publish At:2020-03-11 08:47 | Read:803 | Comments:0 | Tags:Healthcare Identity & Access Access Management Advanced Pers

How a More Connected Approach Can Help With Threat Management

Threat management is a framework that is often used to evaluate and manage everything you can do to detect and respond to cyberthreats. It encompasses people, process and technology, and for effective threat management, all three should work together seamlessly. Of course, that’s easier said than done. When you look at just the technology piece of thre
Publish At:2020-03-06 11:10 | Read:622 | Comments:0 | Tags:Incident Response Risk Management Threat Hunting Threat Inte

Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

The traditional threat landscape comprised of conventional IT assets is difficult enough to protect, detect and respond to, but the landscape seems to be quickly expanding beyond traditional IT. Those new domains are operational technology (OT), the internet of things (IoT) and the internet of medical things (IoMT). Devices from non-traditional IT environmen
Publish At:2020-03-04 13:39 | Read:580 | Comments:0 | Tags:Endpoint Energy & Utility Healthcare Threat Intelligence NIS

Scalable Data Protection Is Critical to Support Data Privacy

Modern privacy regulations are founded on a variety of principles going back to 1890 that sought to protect citizens from “yellow journalism.” Over the following years, governments enacted legislation that sought to respect an individual’s right to privacy, including their image and their correspondence. Following an uptick in data breache
Publish At:2020-02-26 10:55 | Read:767 | Comments:0 | Tags:Data Protection Automation Compliance Data Privacy Forrester

Increase Automation to Overcome Cyber Resilience Challenges

Security operations teams face an exponentially growing volume of security event data while resources mostly remain static. One great way to help solve issues in this space is automation. Despite the recognized benefits of security automation, however, few organizations leverage automation’s capabilities to their full potential, and those who do often
Publish At:2020-02-17 10:47 | Read:579 | Comments:0 | Tags:Incident Response Security Intelligence & Analytics Automati

3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full effect, we saw expensive fines levied upon companies that fell victim to data privacy breaches. As we move into a new year, probably the biggest takeaway from 2019 is tha
Publish At:2020-02-12 10:40 | Read:1565 | Comments:0 | Tags:Data Protection Government Automation Compliance Data Breach

How to Create Value With Your (Security) Data Analytics Program

I have been fascinated by data analytics for all my professional life — from my early days of using Linux command-line tools like grep, cut, sort and unique to make sense of log files and identify the chain of events that harmed my web server, to using simple Excel and pivot tables to do pretty much the same with data of all types. Now, we have much fancier
Publish At:2020-02-10 10:40 | Read:546 | Comments:0 | Tags:Security Intelligence & Analytics Access Management Analytic

Artificial Intelligence (AI) and Security: A Match Made in the SOC

Change is constant in cybersecurity — continual, rapid, dynamic change. It’s impossible to maintain an effective defensive posture without constantly evolving. Security measures that worked in the past will not be effective today, and today’s security controls will not be effective tomorrow. Many factors contribute to this rapid pace of change. A
Publish At:2020-02-09 10:30 | Read:666 | Comments:0 | Tags:Artificial Intelligence Analysts Artificial Intelligence (AI

Don’t Panic! Create a Winning Cybersecurity Strategy to Preserve CISO Sanity

Stress comes with the territory for chief information security officers (CISOs). As noted by Medium, the job is unpredictable, with “long periods of preparing, watching, waiting, punctuated by periods of high stress and occasional bruising.” As both vendors and cyberthreats proliferate, finding a balance between an effective cybersecurity strateg
Publish At:2017-10-31 05:50 | Read:3723 | Comments:0 | Tags:CISO Automation C-Suite Chief Information Security Officer (

Announce

Share high-quality web security related articles with you:)

Tools