HackDig : Dig high-quality web security articles for hackers

Cybersecurity at the Budapest University of Veterinary Medicine

Universities are a popular target for cyberattacks. In fact, 79% of universities have had their reputation damaged by a cyberattack. The main reason for this is the kind of information these institutions store; as well as the personal data of students and staff, which can be sold if stolen, universities also store large amounts of research. This research can
Publish At:2020-05-29 11:59 | Read:114 | Comments:0 | Tags:Business Case Study advanced cybersecurity b2b university

Inrego: Cybersecurity and e-waste recycling

According to the World Economic Forum’s Global Risks Report 2020, climate action failure is the top global risk in terms of impact. One action that can be taken to reduce this risk is to recycle; this goes for everything from domestic waste such as plastic containers, to more complex objects like technology. In fact, the amount of technology that is th
Publish At:2020-04-04 16:10 | Read:489 | Comments:0 | Tags:Business Case Study b2b case study recycling

Aciturri Aeronáutica: cybersecurity in the manufacturing sector

These days, there’s no arguing the fact that all sectors are, to a greater or lesser degree, exposed to some kind of cyber-risks.  This is especially true in a world in which more and more organizations are using networks that are connected to external partners and providers, and are starting to adopt IoT systems, increasing the attack surface. One of the se
Publish At:2020-02-28 10:43 | Read:369 | Comments:0 | Tags:Business Case Study b2b case study industrial sector

ClarkeModet: industrial and intellectual property protected with Panda Security

Cybercrime can have many ambitious objectives: sabotaging a business; stealing money; exfiltrating customers’ personal data and the company’s sensitive information; and even causing physical damage. For certain kinds of companies, there is a objective of cybercrime that can lead to serious financial losses: industrial espionage. For a technological, pharmace
Publish At:2020-01-23 09:15 | Read:567 | Comments:0 | Tags:Business Case Study advanced cybersecurity corporate cyberse

TMS Industrial Services and industrial cybersecurity

These days, there’s no arguing the fact that all sectors are, to a greater or lesser degree, exposed to some kind of cyber-risks.  This is especially true in a world in which more and more organizations are using networks that are connected to external partners and providers, and are starting to adopt IoT systems, increasing the attack surface. One of the se
Publish At:2019-12-02 10:35 | Read:868 | Comments:0 | Tags:Business Case Study Africa business industrial sector

Bidfreight Port Operations and logistics industry cybersecurity

The logistics industry is a vital part of the modern economy. The services provided by this sector ensure the availability of goods and products as essential as food and medicine. It could be seen as the backbone of the economy in many senses. The cybersecurity issues in the industry are, therefore, particularly worrying. A recent report reveals that only 35
Publish At:2019-10-07 10:35 | Read:838 | Comments:0 | Tags:Case Study advanced cybersecurity business

Securing the Modern Endpoint the SANS Maturity Way

In Case You Missed It Bromium recently engaged in a series of communications and events on the topic of Securing the Modern Endpoint, covering timely and provocative concepts including: How detection consistently fails to secure the enterprise and why new thinking is desperately needed How to realign your defenses around a modern threat risk model using few
Publish At:2017-10-30 17:15 | Read:4922 | Comments:0 | Tags:Threats case study data sheet defenses detection endpoint mo

Monitoring Docker on GKE and AWS at Everalbum

Everalbum transitioned from a more static, VM-based architecture to a Docker-based model across dozens of hosts and multiple cloud providers. In addition to monitoring Docker containers, Everalbum leverages Kubernetes and cloud provider-run services. They needed a solution that covers server monitoring, container monitoring and even custom statsd metrics fro
Publish At:2016-09-28 01:50 | Read:4082 | Comments:0 | Tags:Uncategorized Case Study Sysdig Cloud

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud