HackDig : Dig high-quality web security articles for hacker

9 Best Practices from X-Force Red for Organizations and Employees

As employers rapidly respond to the need to protect their workforces from potential exposure and spread of the novel coronavirus, also known as COVID-19, many organizations are making the very difficult decision to pivot to a work-from-home model. This means employees will be connecting to corporate networks from whichever device is available: laptops, phone
Publish At:2020-03-18 16:57 | Read:211 | Comments:0 | Tags:Application Security CISO Data Protection Threat Intelligenc

How We Learned to Stop Worrying and Embrace Remote Work

The industry is in the midst of a transformation. In this case, it isn’t the omnipresent digital transformation but rather a sudden tectonic shift towards remote work. For many organizations built on the classic, communal office space, this can seem daunting. Many employees have started to work from home, and some are throwing a wrench in the machine by conn
Publish At:2020-03-18 13:10 | Read:195 | Comments:0 | Tags:CISO Identity & Access Mobile Security Network BYOD Bring-Yo

Explained: the strengths and weaknesses of the Zero Trust model

In a US court of law, the accused are deemed to be innocent until proven guilty. In a Zero Trust security model, the opposite is true. Everything and everyone must be considered suspect—questioned, investigated, and cross-checked—until we can be absolutely sure it is safe to be allowed. Zero Trust is a concept created by John Kindervag in 2010 during his
Publish At:2020-01-28 16:50 | Read:492 | Comments:0 | Tags:Explained byod cloud framework identity management insider t

Zimperium Integrates Mobile Threat Defense into Microsoft Defender Advanced Threat Protection

The days of “leaving work at your desk” are long gone. Today, employees are mixing business with pleasure at all hours, in different places. It could be checking your email at halftime of your daughter’s soccer game; reviewing an Excel sales forecast spreadsheet while waiting for a friend at dinner; or, finishing up an overseas partner call while in line fo
Publish At:2020-01-23 17:25 | Read:485 | Comments:0 | Tags:Mobile Security advanced mobile threat defense BYOD mobile d

Zimperium Announces Mobile Threat Defense for BYOD users with Microsoft Intune

Today, Microsoft announced an exciting new capability providing additional benefits to users of apps protected by Microsoft Intune app protection policies. You can read the official announcement here. Zimperium device risk-based evaluation is now integrated with Microsoft Intune for protected apps on non-enrolled devices to add another layer of protection f
Publish At:2019-11-12 00:25 | Read:671 | Comments:0 | Tags:Mobile Security Mobile Threat Defense News Partners BYOD Ent

7 Questions to Ask Your Child’s School About Cybersecurity Protocols

Just a few weeks into the new school year and, already, reports of malicious cyberattacks in schools have hit the headlines. While you’ve made digital security strides in your home, what concerns if any should you have about your child’s data being compromised at school? There’s a long and short answer to that question. The short answer is don’t
Publish At:2019-09-19 23:20 | Read:1315 | Comments:0 | Tags:Family Safety BYOD cyberattack cybercrime cybersafety cybers

Don’t Let Liberating Your Employees Give Freedom to Hackers

Liberation. It’s a powerful word. It’s about freedom from limits on thought or behavior.  The reason why I bring this up is because I recently heard from a prospect of mine, here in London, who mentioned he was liberating his employees by giving them the ability to work away from the office. As part of this, he would allow them to work from home on their mo
Publish At:2019-09-19 14:33 | Read:682 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Which are most frequently blacklisted apps by enterprises?

Mobile security firm Appthority published an interesting report that revealed which Android and iOS applications are most frequently blacklisted by enterprises. The company Appthority has published an interesting report that reveals which mobile apps, both Android and iOS, are most frequently blacklisted by enterprises. “The mobile ecosystem in an ente
Publish At:2017-10-04 22:40 | Read:5462 | Comments:0 | Tags:Breaking News Mobile Reports Security blacklisted apps BYOD

Cyber Security Risk: You Can’t Secure It If …

In the course of working with our clients to improve their security posture, I have come across several common themes that often limit a business’s ability to assess and mitigate cyber security risk. Let’s take a look at some of these themes and real-world examples of how they apply. You can’t secure it if…You Don’t Know It̵
Publish At:2016-12-15 06:50 | Read:4557 | Comments:0 | Tags:Featured Articles Risk Management BYOD hack IoT

Healthcare Security and your Doctor’s Cellphone

Healthcare Security and your Doctor’s Cellphone Posted by David Harley on April 7, 2016.I was asked for my response to Skycure’s mobile threat intelligence report, which claimed that ‘One in Five Doctors’ Mobile Device Might be at High Risk’. Not that I’ve
Publish At:2016-04-07 14:55 | Read:3253 | Comments:0 | Tags:David Harley BYOD CYOD mobile security NHS Skycure

BYOD Makes Application Security a Matter of National Security

Several publications have commented on a new study from Harvard’s Berkman Center for Internet and Society. The study was called “Don’t Panic: Making Progress on the ‘Going Dark’ Debate.” Apple and others have designed products with so-called “end-to-end encryption,” meaning that a message between two users can
Publish At:2016-02-12 14:05 | Read:4864 | Comments:0 | Tags:Industry Observations Technical Insight Vulnerabilities Web

5 Guidelines in Battling Cyber Criminals Over Precious Business Data

5 Guidelines in Battling Cyber Criminals Over Precious Business Data, lets’s try to understand how to Ensure Enterprise Security. You would think that a company that stores their clients’ money and handles investments would have tight security measures on their system against cyber attacks. Apparently, this is not always
Publish At:2015-10-15 10:15 | Read:3960 | Comments:0 | Tags:Breaking News Cyber Crime Security BYOD cyber criminals Cybe

3 Tips on How to Create a Cyber Security Culture at Work

This October marks another iteration of National Cyber Security Awareness Month (NCSAM), a program designed to engage both the public and private sectors on good security practices via activities that encourage awareness and resiliency in the event of a national cyber incident.Sponsored by the Department of Homeland Security (DHS) in cooperation with the Nat
Publish At:2015-10-07 13:20 | Read:4729 | Comments:0 | Tags:Featured Articles Security Awareness BYOD cyber security cul

Company’s data at risk due to the use of mobile gambling apps

Veracode has conducted a research on the security of several mobile gambling apps and discovered a number of flaws that expose enterprises to serious risks. If you belong to a global corporation, the most probably think you will find out is that some of your colleagues have installed mobile apps that don’t belong to the work e
Publish At:2015-09-03 17:15 | Read:3700 | Comments:0 | Tags:Breaking News Hacking Security BYOD corporate espionage gamb

How Employees Become Pawns for Hackers

Employees are the greatest security risks, especially since they are prone to be used as pawns for hackers. That’s why they are vulnerable to attacks. Mobile technology has changed the landscape of business these days. It has enabled employees to set up virtual offices, have more work flexibility, and even extend working
Publish At:2015-08-31 01:20 | Read:4043 | Comments:0 | Tags:Breaking News Security Bring Your Own Device BYOD cyber secu


Share high-quality web security related articles with you:)


Tag Cloud