HackDig : Dig high-quality web security articles

Strong Things Have Deep Roots: Capitalizing On Half a Century Of Positive Action In The Cybersecurity Sector  

Being a cybersecurity company in these turbulent times puts us at Tripwire, to some degree, on the front-line.Working with the largest organisations in government, finance and critical national infrastructure, we see good and bad every day. In a confusing hybrid war where APT groups launch attacks that could potentially turn out the lights, it is hard to rem
Publish At:2020-07-15 23:15 | Read:1282 | Comments:0 | Tags:Featured Articles IT Security and Data Protection altruism c

How Cybersecurity Leaders Can Chart the Seas of Business Communication

As organizations prepare for the remainder of 2020, cybersecurity leaders can use this opportunity to review their communication style and improve how they share key messages across the organization. Taking time to refine business communication can help those in security and technical leadership roles heighten the effectiveness of their messaging and ensure
Publish At:2020-06-03 09:20 | Read:1450 | Comments:0 | Tags:CISO Business Continuity C-Suite Chief Information Security

What Enterprises Can Expect Following the Cyberspace Solarium Commission Report

In March 2020, the U.S. Cyberspace Solarium Commission released its report detailing numerous recommendations for how the nation can strengthen its online infrastructure and overall security posture. The Cyberspace Solarium Commission tackled issues of security strategy and overall cybersecurity preparedness across both the private and public sectors in the
Publish At:2020-06-01 11:00 | Read:1448 | Comments:0 | Tags:CISO Government Business Continuity Chief Information Securi

Why Security Orchestration, Automation and Response (SOAR) Is Fundamental to a Security Platform

Security teams today are facing increased challenges due to the “new normal” created by the recent global health crisis. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees must move to a virtual security operations center (SOC) model while address
Publish At:2020-05-24 06:18 | Read:1454 | Comments:0 | Tags:CISO Cloud Security Incident Response Automation Cloud Servi

Extend Your Incident Response Program to DevOps With Security Automation

One of the biggest challenges facing security teams when it comes to incident response is complexity. The continual growth in volume and severity of cyberattacks has led to increased business process and technical complexity as different threat vectors have required security leaders to purchase point solutions with unique user interfaces, custom APIs and bus
Publish At:2020-04-15 07:54 | Read:1600 | Comments:0 | Tags:Incident Response Automation Collaboration Data Breaches Dev

ITG08 (aka FIN6) Partners With TrickBot Gang, Uses Anchor Framework

The past two years have borne witness to the increasing collaboration between organized cybercrime groups to avoid duplication of efforts and maximize profits. Although this collaboration has primarily occurred between gangs developing and distributing well-known banking Trojans, such as Emotet, TrickBot and IcedID, it does not stop there. In a new and dange
Publish At:2020-04-07 08:25 | Read:1984 | Comments:0 | Tags:Advanced Threats Threat Intelligence Banking Trojan Collabor

How Relevance Scoring Can Make Your Threat Intelligence More Actionable

As businesses around the world become more global, the volume and complexity of attacks continue to grow. Protecting a company in today’s environment has become more difficult. For example, securing an organization with offices in London, Hong Kong and Santa Cruz represents a challenge of both scale and complexity for security analysts. In addition, th
Publish At:2020-04-02 09:30 | Read:1324 | Comments:0 | Tags:Security Intelligence & Analytics Threat Intelligence Analys

A Proposed New Trust Framework for Physical and Digital Identity Interactions

Identity is a difficult term to define in the cybersecurity world. The range of personal information that can be associated with an identity interaction is highly dependent on the situational context of the interaction. The definition of identity also depends on the context of the medium within which it is exchanged. In the physical world, when we talk about
Publish At:2020-03-13 07:59 | Read:2471 | Comments:0 | Tags:Identity & Access Collaboration Compliance Customer Experien

Career and Management Advice to Improve Diversity From 21 Leading Women in Cybersecurity

Women in cybersecurity now represent 20 percent of the workforce, according to Cybersecurity Ventures. There’s still a long way to go in closing the industry gender gap, especially when you consider that women make up over half the U.S. workforce. However, the security industry has also made progress, and that’s something to be proud of. In 2013,
Publish At:2020-03-05 08:37 | Read:1696 | Comments:0 | Tags:CISO Career Collaboration Cyber Resiliency Cybersecurity Job

Embracing the Power of Community for Better Security

If you ask any business leader what their goals are for 2020, at some level you’re likely to hear “innovation.” Innovation is essential for competing in the global economy because it helps businesses stay relevant and teams work more efficiently. This need for constant improvement is incredibly clear in the security industry, where both bus
Publish At:2020-03-05 08:37 | Read:1756 | Comments:0 | Tags:Cloud Security Collaboration Innovation Open Source Security

How Human Security Investments Created a Global Culture of Accountability at ADP

Practice doesn’t necessarily make perfect, but it can lead to improvement. Quality practice is key in matters of human security, and the right quantity of practice can also make a significant difference when it comes to shifting mindsets and behavior. “Scientists believe that expert-level performance is primarily the result of expert-level practi
Publish At:2020-03-04 13:39 | Read:1673 | Comments:0 | Tags:CISO Artificial Intelligence (AI) Chief Information Security

Cybercrime Without Borders: Bridging Gaps Between Public and Private Sectors to Ensure a Safer Future

Imagine it’s lunchtime in Manhattan. Hundreds of thousands of people are leaving their desks to visit their favorite eatery and enjoy a short time away from the office. Suddenly, elevators across the city grind to a halt and a significant percentage of New York’s workforce is trapped. After too many hours, the overwhelmed emergency responders a
Publish At:2017-07-28 21:55 | Read:5999 | Comments:0 | Tags:Government Risk Management Collaboration Cybercrime Federal

Spot (and Remedy) the Rotten Apple Before It Spoils the SIEM Barrel

We all have heard the proverb: One rotten apple can spoil the whole barrel. This also applies to many practical scenarios in our day-to-day life, like finding a stinky sock in a pile of fresh laundry. Similarly, in a security operations center (SOC), one of the tasks security analysts spends most of their time on is identifying and detecting the actual threa
Publish At:2017-07-05 12:40 | Read:5136 | Comments:0 | Tags:Incident Response Security Intelligence & Analytics Collabor

Know Your Apps: Explore the IBM Security App Exchange Ecosystem for Collaborative Defense

Collaboration, integration and teamwork are jargon you might hear daily in your professional life. We strive to collaborate with our colleagues, family and friends to achieve our personal goals and share expertise. In 2015, IBM Security took this collaborative approach to the next level by launching the IBM Security App Exchange, a marketplace for the secur
Publish At:2017-05-03 13:10 | Read:6037 | Comments:0 | Tags:Security Intelligence & Analytics Threat Intelligence Applic

Overcoming the Security Side-Eye: Making Collaborative Threat Intelligence Work

The facial expression has many names: side-eye, skepticism, disbelief — the perfect, singular, arched eyebrow over a pair of glasses. Regardless of the name, it is one we have seen both digitally, virtually and in person when discussing collaborative threat intelligence. Yes, we can proclaim that the bad guys are working together and organized cybercrime is
Publish At:2017-02-10 13:10 | Read:4373 | Comments:0 | Tags:Threat Intelligence Collaboration IBM X-Force Exchange Infor

Tag Cloud