HackDig : Dig high-quality web security articles for hackers

Cybersecurity Operations: 5 Ways to Cut Costs Without Pain

Cybersecurity frameworks are notoriously expensive to build and maintain. And, business leaders are frequently dissatisfied with their effectiveness. According to research conducted by the Ponemon Institute, enterprises spend an average of $2.86 million per year on their in-house security operations center (SOC), with more than half of those costs allo
Publish At:2020-08-25 08:55 | Read:485 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) Cybersecurity

Security Modernization for the Cloud

This is the first in a blog series that will focus on all phases of security delivery: design, dev/build, test, deploy, operate and learn.  Many organizations are facing new cybersecurity concerns as they look to accelerate their digital transformations for themselves and their customers. At the same time, information technology (IT) and operations are
Publish At:2020-08-06 09:54 | Read:388 | Comments:0 | Tags:CISO Cloud Security Chief Information Security Officer (CISO

4 Steps to Help You Plan a Cyber Resilience Roadmap

What is cyber resilience?  According to IBM Security’s 2020 Cyber Resilient Organization Report, a cyber resilient organization is one that “more effectively prevents, detects, contains and responds to a myriad of serious threats against data, applications and IT infrastructure.”  In a more colloquial sense, the “further alo
Publish At:2020-07-22 09:40 | Read:371 | Comments:0 | Tags:CISO Risk Management NIST Chief Information Security Officer

Mitigating Container Risk Requires a Comprehensive Approach

Containers have become a staple among large banks and financial services firms, which have used the technology in production. It has captured the attention of the broader market, that hopes to achieve the same technology benefits of improved application delivery and run-time efficiencies. This modular plug-and-play architecture is more scalable and can deliv
Publish At:2020-07-17 14:07 | Read:445 | Comments:0 | Tags:Banking & Financial Services Cloud Security Data Protection

#TwitterHack: Power, Privilege and Pandemic

On Wednesday, July 15, the Twitterverse was ablaze with what Twitter itself has described as a “coordinated social engineering attack” that was launched at around 4pm ET. The outcome of this breach was compromised Twitter accounts of many well-known people and organizations, including Jeff Bezos, Elon Musk, Bill Gates, former President Barack Obama, Joe Bide
Publish At:2020-07-17 14:07 | Read:339 | Comments:0 | Tags:Advanced Threats Security Services Chief Information Securit

Visibility and Threat Detection in a Remote Working World

At the outset of the COVID-19 pandemic, when governments around the world put stay-at-home orders in place, it was hard to imagine the state of work would permanently change. Yet, as organizations rapidly adopted and expanded systems to enable a remote workforce — which doubled in size in just three weeks — company cultures began shifting, too. As employees
Publish At:2020-06-24 11:06 | Read:484 | Comments:0 | Tags:CISO Endpoint Security Intelligence & Analytics Threat Hunti

Three Key Pillars of Smart Identity

For years, identity and access management (IAM) was that painful necessity that businesses knew they had to spend time and resources on, but it was always done kind of grudgingly. Oh, how times have changed! CIOs and CISOs alike have recognized the critical role that identity plays in an overall digital transformation and security program centered around Zer
Publish At:2020-06-09 11:40 | Read:465 | Comments:0 | Tags:Identity & Access Zero Trust Chief Information Security Offi

Shift Your Cybersecurity Mindset to Maintain Cyber Resilience

As the business world navigates the ups and downs of today’s economy, a mindset shift is required to maintain cyber resilience. Cybersecurity, often an afterthought in a strong economy, must not be neglected in responding to shifts in the business landscape. As more companies expand their remote workforce, the number of endpoints with access to corpora
Publish At:2020-06-04 12:22 | Read:483 | Comments:0 | Tags:Data Protection Identity & Access Business Continuity C-Suit

It’s Time to Take a Fresh Look at Zero Trust

With millions of employees across the U.S. experimenting with work-at-home scenarios for the first time, many organizations are taking a fresh look at a Zero Trust security strategy. A convergence of trends and technologies, combined with a new awareness of the risks of relying solely on perimeter defenses for protection, may make this the right time for Zer
Publish At:2020-06-03 09:20 | Read:450 | Comments:0 | Tags:Identity & Access Chief Information Security Officer (CISO)

How Cybersecurity Leaders Can Chart the Seas of Business Communication

As organizations prepare for the remainder of 2020, cybersecurity leaders can use this opportunity to review their communication style and improve how they share key messages across the organization. Taking time to refine business communication can help those in security and technical leadership roles heighten the effectiveness of their messaging and ensure
Publish At:2020-06-03 09:20 | Read:496 | Comments:0 | Tags:CISO Business Continuity C-Suite Chief Information Security

What Enterprises Can Expect Following the Cyberspace Solarium Commission Report

In March 2020, the U.S. Cyberspace Solarium Commission released its report detailing numerous recommendations for how the nation can strengthen its online infrastructure and overall security posture. The Cyberspace Solarium Commission tackled issues of security strategy and overall cybersecurity preparedness across both the private and public sectors in the
Publish At:2020-06-01 11:00 | Read:571 | Comments:0 | Tags:CISO Government Business Continuity Chief Information Securi

Stronger Together — Building Cyber Resilience

In January, the World Economic Forum (WEF) again included cyberattacks as one of the top 10 most likely and significant risks to society in 2020. Less than two months later, ways of working underwent a drastic change due to the global pandemic. With so many employees working remotely and many business functions now in the cloud, organizations are rethinking
Publish At:2020-06-01 07:09 | Read:590 | Comments:0 | Tags:CISO Incident Response Chief Information Security Officer (C

Refocusing Cybersecurity Best Practices on Security Hygiene

While organizations around the world are rightly focused on the COVID-19 pandemic, the work of cybersecurity must continue. In fact, attackers often increase their efforts to breach networks and systems during times of trouble, counting on the chaos as a useful distraction. In such times, the best cybersecurity practices should actually refocus on the most b
Publish At:2020-05-24 06:18 | Read:592 | Comments:0 | Tags:CISO Antivirus Chief Information Security Officer (CISO) Cyb

Spotting the Gray Rhinos Charging Toward Your Business Continuity Posture

Preparing for the Unpredictable There may be some elephants in the board room from time to time, but what about Black Swans or Gray Rhinos? Many of us might be ignoring the warnings of risks to our business from “corporate Cassandras” — named for the priestess in Greek mythology who was cursed to pronounce true prophecies, but never to be believed. By unders
Publish At:2020-05-24 06:18 | Read:456 | Comments:0 | Tags:CISO Risk Management Business Continuity Chief Information S

Measuring the Effectiveness of AI in the SOC

In a previous blog post, I covered some of the challenges encountered by security operations centers (SOCs) and how leveraging artificial intelligence (AI) can help alleviate these challenges, including the cybersecurity skills shortage, unaddressed security risks and long dwell times. According to ISACA’s State of Cybersecurity Report, 78 percent of r
Publish At:2020-05-24 06:18 | Read:557 | Comments:0 | Tags:Artificial Intelligence Artificial Intelligence (AI) Busines

Tools

Tag Cloud