HackDig : Dig high-quality web security articles for hacker

Which are most frequently blacklisted apps by enterprises?

Mobile security firm Appthority published an interesting report that revealed which Android and iOS applications are most frequently blacklisted by enterprises. The company Appthority has published an interesting report that reveals which mobile apps, both Android and iOS, are most frequently blacklisted by enterprises. “The mobile ecosystem in an ente
Publish At:2017-10-04 22:40 | Read:4327 | Comments:0 | Tags:Breaking News Mobile Reports Security blacklisted apps BYOD

Cyber Security Risk: You Can’t Secure It If …

In the course of working with our clients to improve their security posture, I have come across several common themes that often limit a business’s ability to assess and mitigate cyber security risk. Let’s take a look at some of these themes and real-world examples of how they apply. You can’t secure it if…You Don’t Know It̵
Publish At:2016-12-15 06:50 | Read:3639 | Comments:0 | Tags:Featured Articles Risk Management BYOD hack IoT

Healthcare Security and your Doctor’s Cellphone

Healthcare Security and your Doctor’s Cellphone Posted by David Harley on April 7, 2016.I was asked for my response to Skycure’s mobile threat intelligence report, which claimed that ‘One in Five Doctors’ Mobile Device Might be at High Risk’. Not that I’ve
Publish At:2016-04-07 14:55 | Read:2705 | Comments:0 | Tags:David Harley BYOD CYOD mobile security NHS Skycure

BYOD Makes Application Security a Matter of National Security

Several publications have commented on a new study from Harvard’s Berkman Center for Internet and Society. The study was called “Don’t Panic: Making Progress on the ‘Going Dark’ Debate.” Apple and others have designed products with so-called “end-to-end encryption,” meaning that a message between two users can
Publish At:2016-02-12 14:05 | Read:4223 | Comments:0 | Tags:Industry Observations Technical Insight Vulnerabilities Web

5 Guidelines in Battling Cyber Criminals Over Precious Business Data

5 Guidelines in Battling Cyber Criminals Over Precious Business Data, lets’s try to understand how to Ensure Enterprise Security. You would think that a company that stores their clients’ money and handles investments would have tight security measures on their system against cyber attacks. Apparently, this is not always
Publish At:2015-10-15 10:15 | Read:3036 | Comments:0 | Tags:Breaking News Cyber Crime Security BYOD cyber criminals Cybe

3 Tips on How to Create a Cyber Security Culture at Work

This October marks another iteration of National Cyber Security Awareness Month (NCSAM), a program designed to engage both the public and private sectors on good security practices via activities that encourage awareness and resiliency in the event of a national cyber incident.Sponsored by the Department of Homeland Security (DHS) in cooperation with the Nat
Publish At:2015-10-07 13:20 | Read:3931 | Comments:0 | Tags:Featured Articles Security Awareness BYOD cyber security cul

Company’s data at risk due to the use of mobile gambling apps

Veracode has conducted a research on the security of several mobile gambling apps and discovered a number of flaws that expose enterprises to serious risks. If you belong to a global corporation, the most probably think you will find out is that some of your colleagues have installed mobile apps that don’t belong to the work e
Publish At:2015-09-03 17:15 | Read:2935 | Comments:0 | Tags:Breaking News Hacking Security BYOD corporate espionage gamb

How Employees Become Pawns for Hackers

Employees are the greatest security risks, especially since they are prone to be used as pawns for hackers. That’s why they are vulnerable to attacks. Mobile technology has changed the landscape of business these days. It has enabled employees to set up virtual offices, have more work flexibility, and even extend working
Publish At:2015-08-31 01:20 | Read:3346 | Comments:0 | Tags:Breaking News Security Bring Your Own Device BYOD cyber secu

From the Trench of Insecurity

Imagine a circumstance where a significant investment has been made into a data loss prevention (DLP) solution in which it paves the way for a lip-service approach towards cyber security, with the very real-world association of unknown exposures.As amazing as it may seem, here is such a case in history that may leave you with two opinions, which are, in the
Publish At:2015-08-20 17:15 | Read:4267 | Comments:0 | Tags:Cyber Security Featured Articles BYOD Cyber Crime DLP Soluti

BYOD – the tech revolution that wasn’t

Budding technology trends start the same way: X is going to cause a revolution. Be a game changer. Disrupt the company, the industry, the world – maybe even the universe. And then reality sets in. Sure, X might change the lives of some people at some companies, but far from all, and then business bumps along per usual. So goes – perhaps – the Bring Your Own
Publish At:2015-08-20 12:20 | Read:3295 | Comments:0 | Tags:BYOD Consumerization of IT Security

Shadow BYOD: The mobility program you thought you didn’t have

While the federal government might be under the impression that it doesn’t have a BYOD program, it is overlooking a key issue: Shadow BYOD. Shadow BYOD is very similar to Shadow IT, in which employees use technologies — usually to enhance their productivity — that the IT department has not sanctioned or deployed. In Shadow BYOD’s case, it’s the
Publish At:2015-08-19 16:30 | Read:2366 | Comments:0 | Tags:#Data BYOD Federal mobile security

Managing Risks of a Hybrid Cloud Environment When You’re A Small Business

First, it was cloud computing that sparked the imaginations of businesses in terms of all the benefits they could receive. Then, came the division of public and private clouds; some companies wanted to keep their cloud on-premise, while others looked to cloud providers. Now, the next step in the cloud revolution has come—the gradual adoption of the hybrid cl
Publish At:2015-06-29 12:05 | Read:3791 | Comments:0 | Tags:Connecting Security to the Business Featured Articles applic

What Lurks in the Shadow: Addressing the Growing Risk of Shadow IT & Shadow Data

What happens when users or employees take it upon themselves to decide what tech they want to use and how they want to implement it?From my vantage point, InfoSec faces a constant challenge of trying to keep up with threats, let alone stay one step ahead. But as the Internet of Things proliferates, and human nature takes its course, we cannot out-engineer hu
Publish At:2015-06-12 08:55 | Read:3846 | Comments:0 | Tags:Off Topic BSidesLV BYOD Cheryl Biswas Information Security s

Core Impact New Feature Spotlight: Mobile Device Penetration Testing

Mobile device penetration testing is one of the new capabilities released in Core Impact Pro 2014 R2. When it comes to BYOD, resistance is futile. Whether or not your organization has implemented a formal policy around it, employees are using mobile devices at work. Showing them how easily a bad habit or careless decision around mobile connectivity can lead
Publish At:2015-04-30 03:26 | Read:3158 | Comments:0 | Tags:What's New At Core BYOD CORE Impact Penetration testing

Why Bring your own Device (BYOD)?

Do you ever use your personal phone to make work related calls? Or send work related e-mails? Maybe you even use it to work on Google Docs, or access company files remotely? Doing these things basically means you’re implementing a BYOD policy at your work, whether they know it or not. BYOD – that’s bring your own device – isn’t really a new trend, but it is
Publish At:2015-04-18 04:20 | Read:3435 | Comments:0 | Tags:Mobile Security BYOD communication F-Secure Phone VPN


Share high-quality web security related articles with you:)


Tag Cloud