HackDig : Dig high-quality web security articles for hacker

Cloud Security Is Not an Either/Or

Now that cloud has become pervasive, organizations and individuals everywhere need to think about cloud security. To say that data is either fully secure or vulnerable in the cloud would be far too simplistic. Two Schools of Thought There are two widespread but opposite beliefs surrounding security in the public cloud: Abandon all hope! When you send dat
Publish At:2017-07-20 21:00 | Read:2440 | Comments:0 | Tags:Cloud Security Cloud Cloud Computing Data Breach Human Facto

Current Trends in Identity and Access Management: July 2017

Identity and access management (IAM) is a mature and well understood domain of security. That doesn’t mean it’s static. While IAM is commonly associated with security — indeed, it is an essential part of a holistic security program — many people are beginning to understand the business processes it represents as well. They therefore view it as an
Publish At:2017-07-05 12:40 | Read:2934 | Comments:0 | Tags:CISO Cloud Security Identity & Access Security Intelligence

In Case You Missed the Memo: What’s New in IBM’s Application Security Testing?

In the popular office parody “Office Space,” there’s an ongoing joke about a recent memorandum that requires employees to attach cover sheets to their testing procedure specification (TPS) reports when they submit them to management. When fictional corporate executive Bill Lumbergh confronts employee Peter Gibbons at his cubicle to discuss
Publish At:2017-06-28 14:55 | Read:2701 | Comments:0 | Tags:Application Security Cloud Security Risk Management Applicat

Digital Transformation Means Infusing Identity Everywhere

Organizations are rapidly adopting new technologies such as cloud, mobile and the Internet of Things (IoT) to facilitate and accelerate digital transformation. Securing these environments means managing identities throughout the organization, and next-generation identity and access management (IAM) strategies must give IT the ability to swiftly enable cloud,
Publish At:2017-06-14 01:00 | Read:3268 | Comments:0 | Tags:Cloud Security Identity & Access Access Management Cloud Clo

Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications

Microsoft Office 365 is popular — very popular. In 2016, Gartner reported that 78 percent of enterprises surveyed used or planned to use Office 365. With access to a range of user activity events from a variety of sources, including Exchange Online, SharePoint Online and Azure Directory, how can Office 365 administrators correlate all this valuable data wit
Publish At:2017-05-26 08:10 | Read:3962 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Security In

Zombie Cloud Data: What Your Delete Key May Not Delete

The convenience and flexibility of the cloud has transformed data storage for organizations and individual users alike. Cloud storage is especially useful for data that must be shared among multiple users or multiple devices. But for all its convenience, the cloud also adds a new complexity to the old security challenge of making sure that deleted data is
Publish At:2017-05-24 00:45 | Read:2882 | Comments:0 | Tags:Cloud Security Data Protection Cloud Cloud Services Provider

Taming the Open Source Beast With an Effective Application Security Testing Program

Cute Attacks With Acute Impact on Your Application Security Testing Effectiveness Here we go again: Another attack with a cute name is about to make the news. More dangerous than a Ghost, a POODLE, a FREAK, a Heartbleed, a Shellshock or the other 6,000-plus attacks that show up each year, we know at least two things about it:   It will probably attack
Publish At:2017-05-05 01:55 | Read:3237 | Comments:0 | Tags:Application Security Cloud Security DevOps Open Source Stati

Is It Really Safe for FSS Firms to Utilize Hybrid Cloud Services?

The financial services sector (FSS) is accelerating the adoption of cloud. According to a 451 Research survey, financial companies are adopting hybrid cloud services as a core part of their technology and infrastructure strategies. Hybrid cloud is defined as a cloud computing environment that utilizes a mixture of on-premises private cloud and third-party p
Publish At:2017-04-28 14:00 | Read:2953 | Comments:0 | Tags:Banking & Financial Services Cloud Security Cloud Compliance

Five Questions to Ask Yourself About the Security of Your Cloud Workloads

By 2020, 90 percent of enterprises will be on the hybrid cloud. Even though a move to the cloud is now inevitable, few organizations have a comprehensive grasp of how to secure it. This is especially challenging when organizations are on multiple cloud environments from multiple service providers, since each has its own set of native security controls. Five
Publish At:2017-04-27 01:10 | Read:3393 | Comments:0 | Tags:Cloud Security Security Services Cloud Cloud Services Provid

IDaaS Market Leader News: IBM Cloud Identity Service Named Market Leader in IDaaS

Coming on the heels of earning among the highest overall scores in Gartner’s Critical Capabilities for Identity and Access Management-as-a-Service (IDaaS), IBM Cloud Identity Service is ranked at the top of the worldwide IDaaS market leader board by analyst firm Ovum in its 2017 IDaaS Decision Matrix report. Many factors contributed to Cloud Identity S
Publish At:2017-04-17 01:45 | Read:3362 | Comments:0 | Tags:Cloud Security Identity & Access Cloud Identity Service Gart

Do We Need to Worry About Shadow IT?

Shadow IT is still a challenge for organizations. With the constant introduction of new productivity and communication tools, as well as the adoption and evolution of existing services, users are more inclined to collaborate outside of IT-sanctioned applications. It is often easier to share information using one of the apps already integrated on our phones
Publish At:2017-03-30 14:55 | Read:2658 | Comments:0 | Tags:Cloud Security Cloud Cloud Applications Mobile Apps Mobile D

Securing Your Cloud-Based Resources: Start With These Four Areas

Cloud-based resources have found their way into nearly every aspect of computing. While they have proven to generally be secure, enterprises are still directly responsible for protecting their systems and data in this environment. It is not enough to take the cloud service provider’s word that their systems are secure and impenetrable. Enterprises ne
Publish At:2017-03-23 16:56 | Read:1901 | Comments:0 | Tags:Cloud Security Risk Management Cloud Cloud Computing federat

Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations

Every five or six years, I find myself facing another major consumer purchase decision. My car gets old and my transportation needs change, for instance. It’s not quite as strategic as choosing a security analytics solution to protect a corporate enterprise, but neither I nor a chief information security officer (CISO) wants to regret the ultimate deci
Publish At:2017-03-10 12:10 | Read:3212 | Comments:0 | Tags:Cloud Security Security Intelligence & Analytics Cloud IBM Q

Hybrid Cloud Adoption: The Logical Next Step Toward Innovation and Modernization

The adoption rate of hybrid cloud among enterprises is growing significantly. Companies that have been sold on the trends and success stories are embarking on cloud transformations that enable them to introduce new services, expand sales and monetize data. To be sure, there are some security concerns for IT leaders to consider before migrating sensitive data
Publish At:2017-03-08 23:20 | Read:2420 | Comments:0 | Tags:CISO Cloud Security Cloud Cloud Services Data Protection Hyb

Avoid Lengthy Pit Stops Along the Road to the Data Protection Finish Line

An alarming number of organizations today are doing the bare minimum to meet compliance standards and build a total data protection strategy. They are completely unaware of the data security race as news reports of recent cyberattacks and breaches show a surge in perpetrators gaining control of critical data. These malicious actions could ultimately threaten
Publish At:2017-03-08 04:55 | Read:3035 | Comments:0 | Tags:Cloud Security Data Protection Cloud Computing Compliance Da


Share high-quality web security related articles with you:)


Tag Cloud