HackDig : Dig high-quality web security articles for hacker

Crypto-Risk: Your Data Security Blind Spot

For many years — almost since the beginning of secure internet communications — data security professionals have had to face the challenge of using certificates, the mechanism that forms the basis of Transport Layer Security (TLS) communications. Certificates facilitate secure connections to websites (represented by the “s” in “https”
Publish At:2020-03-23 10:45 | Read:152 | Comments:0 | Tags:Data Protection Risk Management Apple Business Continuity Ce

How CIAM Addresses the Challenges of Consumer Identity Management

Consumer identities are at the heart of brand engagements today. Digital interactions are a routine part of our lives and touchpoints for consumers have reached astounding heights. Nearly 60 percent of the world is digitally connected and more than half of the world’s population will be using social media by the middle of 2020, according to We Are Soci
Publish At:2020-03-19 08:08 | Read:210 | Comments:0 | Tags:Identity & Access Security Services Business Continuity Comp

Grow Your Business With an Evolving Cloud Security Strategy

We have all heard the castle-and-moat analogy to describe traditional centralized approaches to cybersecurity. As cloud security becomes increasingly important in the modern landscape, I think we should add one more component to the analogies we use to think about security: fog. Sometimes the fog is so thick that you can barely see what is in front of you or
Publish At:2020-03-17 10:37 | Read:107 | Comments:0 | Tags:Cloud Security Security Intelligence & Analytics Business Co

Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security

Artificial intelligence (AI) isn’t new. What is new is the growing ubiquity of AI in large organizations. In fact, by the end of this year, I believe nearly every type of large organization will find AI-based cybersecurity tools indispensable. Artificial intelligence is many things to many people. One fairly neutral definition is that it’s a bran
Publish At:2020-02-09 10:30 | Read:314 | Comments:0 | Tags:Artificial Intelligence Data Protection Identity & Access di

How Do You Measure the Success of Your Patch Management Efforts?

If you follow the news, you will often see that yet another company has been breached or taken hostage by ransomware. If you read the full details of these stories, usually they have one main thing in common: These organizations are behind in patch management. The question that arises, then, is why? There are two sides to this story: A technical one and a pr
Publish At:2020-02-09 10:30 | Read:321 | Comments:0 | Tags:Endpoint Risk Management Business Continuity Common Vulnerab

What Leadership Qualities for CISOs Are Most Important in 2020?

Organizations today have to balance the need for continuous evolution along the digital continuum with the need to protect their data and operations and keep cyber risk at an acceptable level. The chief information security officer (CISO) role is uniquely positioned to help organizations manage those dualities, but it requires a different set of leadership q
Publish At:2020-02-09 10:30 | Read:223 | Comments:0 | Tags:CISO digital trust Business Continuity C-Suite Chief Informa

11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget

The global average cost of a data breach is now $3.92 million — a 12 percent increase since 2014. Fortunately, the average cybersecurity budget is also increasing alongside breach cleanup costs. How to prioritize your budget is never a simple question. However, there’s a lot of insight to be gleaned from industry studies on how chief information secur
Publish At:2019-10-18 10:20 | Read:853 | Comments:0 | Tags:CISO Business Continuity Chief Executive Officer (CEO) Chief

Poor Management of Security Certificates and Keys Leads to Preventable Outages

Digital security certificates have become a vital part of online communications. Combining cryptography with a standardized format, they have grown from simple assertions of identity to full authentication methods. But as important as they have become, security certificates remain fallible. More Certificates, More Problems According to a Venafi study, 79 pe
Publish At:2017-09-01 10:00 | Read:2854 | Comments:0 | Tags:Risk Management Authentication Browser Security Business Con

The Current State of IT Resilience

IT resilience refers to a network or system’s ability to withstand the slings and arrows of life and operations, from human error to migration failure to natural disaster. Any of these unavoidable factors can disrupt or even cripple an enterprise. As a concept, IT resilience is closely related to security. A deliberate attack is, in a sense, a predicta
Publish At:2017-01-27 17:35 | Read:3814 | Comments:0 | Tags:Risk Management Business Continuity Cloud Cloud Computing Cl

Cyber attacks and data breaches are top business continuity concerns

The Business Continuity Institute has, for the past 5 years, published a report which identifies the top business continuity concerns, as shared by a variety of organisations. In its latest such publication, known as the Horizon Scan, it determined that the largest threats to business continuity are as follows: Cyber attacks Data breaches Unplanned IT and t
Publish At:2016-02-08 16:10 | Read:2900 | Comments:0 | Tags:Business Continuity

Business Continuity Management: Crisis Leadership

High-profile events such as data breaches, natural disasters and terrorist attacks are raising enterprise awareness of business continuity management (BCM). Leaders have a crucial stake in ensuring the continuity and resiliency of business operations in the face of interruptions. Unfortunately, many organizations still have not put into place the people, pro
Publish At:2016-01-25 17:05 | Read:5491 | Comments:0 | Tags:CISO Data Protection Risk Management Business Continuity Com

Cloud Strategy: Do You Have Your Cloud Exit Plan Ready?

Each day, cloud services are becoming more commoditized, with the advent of new service providers claiming to offer best-of-breed services. There is no question that the cloud promises immense benefits, but before you jump onto the cloud bandwagon or sign a contract with a cloud service provider, it is important to think about your exit plan. Cloud exit plan
Publish At:2014-10-02 20:20 | Read:3561 | Comments:0 | Tags:CISO Cloud Security Government and Federal Business Continui

A Voice of Reason in the Midst of Chaotic Security Breaches

Amidst the daily publication of new security breaches and threats, a voice of reason can be heard through formal security-intelligence-sharing organizations. As businesses near-strive to make sense of breaking news — much of it based on tidbits of real data, overblown reactions and an apparent need to spread fear, uncertainty and doubt — organizations seek a
Publish At:2014-09-17 04:50 | Read:3515 | Comments:0 | Tags:CISO Risk Management Business Continuity cybersecurity frame

Protect Your POS Environment Against Retail Data Breaches

New data breaches are frequently reported in the news. What should you be doing to protect your enterprise? We've gathered some of our most recent and frequently accessed articles and blogs in one area for one-stop access to industry-leading information from Symantec.Recently PublishedSecure Your Point-of-Sale System: News headlines have been inu
Publish At:2014-09-05 11:50 | Read:2810 | Comments:0 | Tags:Security Security Community Blog Business Continuity Data Br

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud