HackDig : Dig high-quality web security articles for hackers

Cybersecurity Awareness: 6 Myths And How To Combat Them

National Cybersecurity Awareness month is upon us. And, so is the opportunity to look at what common C-suite misconceptions could be handcuffing security awareness efforts.  As we enter the back half of 2020, now is the time to look at myths and highlight their relevancy in this chaotic year. Which myths are in the modern threat landscape? An
Publish At:2020-10-07 09:34 | Read:209 | Comments:0 | Tags:CISO Incident Response Risk Management Cybersecurity cyberse

Integrating Security Awareness Training Into Employee Onboarding

Training your team on security awareness is an essential part of a successful security program. And, new employee onboarding is an optimal time to introduce your staff to your security best practices. This is in large part due to the fact that they likely won’t know your company’s protocols for secure information nor how to securely navigate int
Publish At:2020-10-01 09:16 | Read:131 | Comments:0 | Tags:CISO Identity & Access Risk Management Cybersecurity Trainin

Taking the Risk Out of Mergers and Acquisitions

In the post-COVID-19 economy, cyber risk and cybersecurity will play a central role in unlocking mergers and acquisitions (M&A) deal valuations. While economic uncertainty has contributed to a decline in M&A activity in the first half of 2020, many analysts expect an increase in deals during 2020-21 based on several conditions. The Mergers and Acqui
Publish At:2020-09-30 12:45 | Read:199 | Comments:0 | Tags:Banking & Financial Services CISO Risk Management Security S

Risk Management: How Security Can Learn to Do the Math

Risk management is an important element in using data to get ahead of cybersecurity risks before they happen. The costs of protecting an enterprise of any size against cyber attacks continue to rise. Once a business truly understands the consequences of an incident, its leaders must decide how to manage the risk. They can choose to accept, reduce or av
Publish At:2020-09-16 21:17 | Read:206 | Comments:0 | Tags:CISO Risk Management Security Services Cybersecurity Financi

Back to Basics: Creating a Culture of Cybersecurity at Work

The importance of security culture can be seen now more than ever. Many of us work remotely; there are app concerns; and the lines between personal and business use of devices and networks are blurred, challenging our cyber resilience. Therefore, despite all the great tools, frameworks and protective measures in place, we need to ensure people are doin
Publish At:2020-09-16 09:33 | Read:294 | Comments:0 | Tags:CISO Data Protection Security Services cybersecurity educati

Creating a Cybersecurity Culture Starts With Your Team

As cyberattacks become more prevalent and sophisticated, companies must put more faith in their employees to make sure they don’t put data at risk or fall victim to ransomware. But, employees are busier than ever. And, creating a cybersecurity culture at work becomes both more important and more challenging when employees work at home. Creating a stro
Publish At:2020-09-09 13:18 | Read:247 | Comments:0 | Tags:CISO Data Protection Security Services Cybersecurity Trainin

CISO: What the Job REALLY Entails and How It’s Evolved over the Years

All of us know what a Chief Information Security Officer (CISO) does from afar. A CISO upholds the organization’s overall security by overseeing the operations of the IS practice, the IT security department and related staff. In this capacity, those who become a CISO attain the highest paying job in information security, as it carries the associated responsi
Publish At:2020-09-02 01:45 | Read:363 | Comments:0 | Tags:IT Security and Data Protection CISO crowdsourced

4 Steps to Consider When Starting a New Cybersecurity Career

At a time when layoffs are painfully common, now might not seem like a great time to look for a new job or switch careers. Or, is it? The cybersecurity skills gap has not gone away, and companies of all kinds are in need of people with knowledge in this area. And, it’s not just the wealth of jobs that make a cybersecurity career compelling right now.
Publish At:2020-08-27 08:49 | Read:412 | Comments:0 | Tags:CISO Career Cybersecurity Security Professionals security cy

Cybersecurity Operations: 5 Ways to Cut Costs Without Pain

Cybersecurity frameworks are notoriously expensive to build and maintain. And, business leaders are frequently dissatisfied with their effectiveness. According to research conducted by the Ponemon Institute, enterprises spend an average of $2.86 million per year on their in-house security operations center (SOC), with more than half of those costs allo
Publish At:2020-08-25 08:55 | Read:496 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) Cybersecurity

Your Newest Cybersecurity Professional Is Already in Your Company

The cybersecurity talent gap is real. The 2019/2020 Official Annual Cybersecurity Jobs Report predicts that there will be 3.5 million security jobs left unfilled globally by 2021. The cybersecurity profession hit a 0% unemployment rate and the pay is good. So, why are security leaders struggling to fill positions? It could be because they are looking for th
Publish At:2020-08-20 08:22 | Read:360 | Comments:0 | Tags:CISO Career Cybersecurity Cybersecurity Jobs IT Security Sec

Security Modernization for the Cloud

This is the first in a blog series that will focus on all phases of security delivery: design, dev/build, test, deploy, operate and learn.  Many organizations are facing new cybersecurity concerns as they look to accelerate their digital transformations for themselves and their customers. At the same time, information technology (IT) and operations are
Publish At:2020-08-06 09:54 | Read:424 | Comments:0 | Tags:CISO Cloud Security Chief Information Security Officer (CISO

Build a Roadmap for Cyber Resilience

The current information security landscape is rapidly evolving. According to the latest research from IBM Security and the Ponemon Institute’s 2020 Cyber Resilient Organization Report, 67% of organizations reported that the volume of attacks had significantly increased over the past 12 months. It’s not just the amount of attacks that grew; 64% o
Publish At:2020-08-03 08:33 | Read:396 | Comments:0 | Tags:CISO Data Protection Endpoint Advanced Attacks Advanced Thre

4 Steps to Help You Plan a Cyber Resilience Roadmap

What is cyber resilience?  According to IBM Security’s 2020 Cyber Resilient Organization Report, a cyber resilient organization is one that “more effectively prevents, detects, contains and responds to a myriad of serious threats against data, applications and IT infrastructure.”  In a more colloquial sense, the “further alo
Publish At:2020-07-22 09:40 | Read:378 | Comments:0 | Tags:CISO Risk Management NIST Chief Information Security Officer

What Are Insider Threats and How Can You Mitigate Them?

What is an insider threat? Insider threats are users with legitimate access to company assets who use that access, whether maliciously or unintentionally, to cause harm to the business. Insider threats aren’t necessarily current employees, they can also be former employees, contractors or partners who have access to an organization’s systems or d
Publish At:2020-07-17 14:07 | Read:425 | Comments:0 | Tags:CISO Endpoint Identity & Access Access Management Cost of a

The 2020 Cyber Resilient Organization: Preparation and Technology Differentiate High Performers

The Ponemon Institute just released its annual “The Cyber Resilient Organization” report, sponsored by IBM Security. In its fifth year, this study takes an in-depth look at organizations’ ability to prevent, detect, contain and respond to cyberattacks. The report examines changes in cyber resilience and identifies approaches and best practices organizations
Publish At:2020-06-29 18:30 | Read:486 | Comments:0 | Tags:CISO Incident Response Application Security Automation Cloud

Tools

Tag Cloud