HackDig : Dig high-quality web security articles for hacker

Today’s Predictions for Tomorrow’s Internet: IBM Experts Look Ahead for NCSAM

In case you haven’t noticed the flood of dedicated content here on SecurityIntelligence, not to mention Twitter, we are currently in the midst of National Cyber Security Awareness Month (NCSAM). The overarching theme of this year’s campaign is “Securing the Internet Is Our Shared Responsibility,” which is a critical lesson to remember
Publish At:2017-10-22 05:00 | Read:88 | Comments:0 | Tags:CISO Education IBM Security National Cyber Security Awarenes

Your Security Awareness Program Stinks. Here’s Something You Can Do About It

If you ask a group of technology and business professionals to rank the most important parts of their security program, awareness and training will undoubtedly land in the top three. After all, many breaches start with users and, on the flip side, can be prevented by users. It’s all about setting expectations. Unfortunately, many such attempts fall fla
Publish At:2017-10-22 05:00 | Read:122 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) Cybersecurity

Don’t Let Organizational Politics Derail Security Initiatives

Information security is vastly complex, both technically and from a governance, risk and compliance (GRC) perspective. When workplace politics come into play, security best practices become more complicated and risk management is weakened significantly. Security professionals commonly meet resistance when they attempt to implement IT initiatives that do not
Publish At:2017-10-22 05:00 | Read:76 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Execu

The CISO’s Guide to Minimizing Health Care Security Risks

In an ever-changing, dynamic threat landscape, a chief information security officer (CISO) in the health care sector must have knowledge in multiple areas and understand that data breaches have severe repercussions that affect employees, patients and the organization at large. To respond effectively to health care security risks, a CISO must possess well-rou
Publish At:2017-10-06 10:25 | Read:120 | Comments:0 | Tags:CISO Health Care Chief Information Security Officer (CISO) H

Sink or Swim: Uniting the C-Suite, Sales and Security to Fight Advanced Cyberattacks

One of the most disturbing security trends over the last few years has been the rise of the meta attack. The scope of this type of attack is far larger and wider than a threat designed to achieve a specific goal. These advanced cyberattacks are so significant, in fact, that they could sink an entire organization if it doesn’t take the time to install l
Publish At:2017-10-06 10:25 | Read:114 | Comments:0 | Tags:CISO Incident Response Risk Management Advanced Attacks Adva

Fasten Your Seat Belt: Accelerating Your Digital Transformation Through Collaboration

When I think about my family vacations from childhood, I remember camping trips, hours on the beach, sharing stories around the campfire and the fun my siblings and I used to have in the back seat of the car — jumping on each other, switching seats and hopping from the third row into the front seat. Half the fun was enabled by the fact that we had no seat be
Publish At:2017-10-04 21:35 | Read:101 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Cyber

Basic Security Tools You Cannot Afford to Miss in Your Risk Management Program

Risk management is the process of identifying, assessing and controlling threats to an organization. It is also a way to increase the security maturity of an organization. Risk management allows you to think about security more strategically and answer the questions that come from your company board, such as: How many times was the organization attacked? Is
Publish At:2017-10-03 08:40 | Read:274 | Comments:0 | Tags:CISO Incident Response Risk Management Incident Management I

Cybersecurity Strategy, Risk Management and List Making

When confronted with the daunting task of developing a cybersecurity strategy, many people don’t know where to start. The quick answer is to make a list of the tasks required to accomplish the project, organize them by functional categories and determine what resources need to be brought together to accomplish the tasks on the list. This might seem lik
Publish At:2017-10-03 08:40 | Read:216 | Comments:0 | Tags:CISO Government Risk Management Cybersecurity Cybersecurity

Getting an Earful: Convincing Employees to Care About Network Security

Employees remain the biggest source of corporate cyber risk. According to the “IBM X-Force 2016 Cyber Security Intelligence Index,” staff members are responsible for 60 percent of all digital attacks endured by enterprises. In most cases, there’s no malicious intent. Employees may subvert network security by opening infected email attachmen
Publish At:2017-09-29 11:51 | Read:193 | Comments:0 | Tags:CISO Network Chief Information Security Officer (CISO) Educa

How the Value Outweighs the Cost of Security

What is the cost of security in your company? Regardless of size, companies must prioritize the security of their business, customers, clients and partners. According to Forbes, Bank of America’s Chairman and CEO Brian Moynihan reported that the business spent $400 million on cybersecurity in 2015. He also noted that cybersecurity was the only sector w
Publish At:2017-09-26 09:56 | Read:128 | Comments:0 | Tags:CISO Security Services Chief Information Security Officer (C

Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges

Every chief information security officer (CISO) faces ongoing threats to his or her company’s assets. While some threats apply to every industry, IT security specialists in the health care, financial services, and energy and utilities sectors need to pay more attention to industry-specific security risks. Although these threats are most prevalent in th
Publish At:2017-09-26 09:56 | Read:140 | Comments:0 | Tags:Banking & Financial Services CISO Energy & Utility Health Ca

From the Starship Enterprise to Your Enterprise: Eight Cybersecurity Lessons From ‘Star Trek’

Many people in the security industry today grew up watching “Star Trek,” from the original episodes to Next Generation, Deep Space Nine, Voyager, Enterprise and the many other series that followed. In anticipation of the upcoming “Star Trek: Discovery” series, we thought it would be a good time to remind our readers that, beyond the e
Publish At:2017-09-25 15:30 | Read:164 | Comments:0 | Tags:CISO Risk Management Cyber Risk Cybersecurity Incident Respo

The Myth of Mutual Exclusivity: Making the DevOps Process More Agile Without Compromising Security

The marketplace is demanding agility, but many enterprises perceive the need for agility as an ongoing security risk. If applications are constantly evolving, they assume, the process will constantly open up new avenues for attackers to exploit. This worry has given rise to a widespread misconception that security or agility is a binary choice. But a growing
Publish At:2017-09-21 19:15 | Read:168 | Comments:0 | Tags:Application Security CISO Agile DevOps SecDevOps Security Pr

When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law

In recent years, several high-profile breaches involving customer data have led to long and costly litigations. These events demonstrated that data protection is more than just a cybersecurity concern. When responding to a data breach, legal teams have to work closely with the chief information security officer (CISO) to ensure that security policies, r
Publish At:2017-09-21 19:15 | Read:63 | Comments:0 | Tags:CISO Incident Response Chief Information Security Officer (C

National IT Professionals Day: Recognizing the Saintly Patience of IT Workers

Sept. 19 is National IT Professionals Day, which got off the ground two years ago as a way to recognize and celebrate all the work, worry and downright wacky things that happen to IT professionals. For chief information security officers (CISOs), the event offers a chance to step back, take a hard look at teams and give credit where credit is due. With the i
Publish At:2017-09-19 12:00 | Read:44 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Profe

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud