HackDig : Dig high-quality web security articles for hacker

When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law

In recent years, several high-profile breaches involving customer data have led to long and costly litigations. These events demonstrated that data protection is more than just a cybersecurity concern. When responding to a data breach, legal teams have to work closely with the chief information security officer (CISO) to ensure that security policies, r
Publish At:2017-09-21 19:15 | Read:42 | Comments:0 | Tags:CISO Incident Response Chief Information Security Officer (C

Think You Have Plenty of Time to Plan for GDPR? Think Again

We all do it. We look at a deadline that’s months away and we tell ourselves we’ve got lots of time to think about it. In fact, that’s probably what you thought when you first heard about the European Union (EU) General Data Protection Regulation (GDPR), which takes effect May 25, 2018. Even now, it’s still months away — right? So w
Publish At:2017-09-12 13:50 | Read:174 | Comments:0 | Tags:Banking & Financial Services Data Protection Compliance Data

The Time for IT Asset Management Is Now

The benefits of a comprehensive IT asset management (ITAM) program may seem obvious since it provides the data needed to strategically and tactically manage the life cycle of IT assets from purchase to end of life. Of course, companies can leverage IT asset management to reduce costs, improve operational efficiency, determine the full cost of existing invest
Publish At:2017-09-05 09:35 | Read:143 | Comments:0 | Tags:Data Protection Asset Management Compliance Data Security En

The Power of Pervasive Encryption

The new z14 mainframe computer offers a chance to re-evaluate what a mainframe can do for an organization. Gone are the days when the mainframe was the only way to do computing. Today, there are new and different choices, and the z14 can make those choices practical. The z14 features standard improvements that users have come to expect, such as faster, mor
Publish At:2017-08-15 11:45 | Read:278 | Comments:0 | Tags:Data Protection Mainframe Compliance Cryptography Data Secur

Mainframe Data Is Your Secret Sauce: A Recipe for Data Protection

We in the security field like to use metaphors to help illustrate the significance of data in the enterprise. I’m a big fan of cooking, so I’ll use the metaphor of a secret sauce. Think about it: Each transaction basically reflects your organization’s unique relationship with a customer, supplier or partner. By sheer quantity alone, mainfra
Publish At:2017-07-31 23:40 | Read:362 | Comments:0 | Tags:Data Protection Mainframe Compliance Encryption Mainframe Se

Multipronged IoT Security to Help Realize the Value of IoT Solutions

The Internet of Things (IoT) is an exciting and innovative technology that can help businesses discover new growth areas and income streams. With all this innovation to differentiate in industry verticals and challenge traditional operating models, it’s easy to overlook IoT security, both in terms of its uniqueness and its importance. What Is Different
Publish At:2017-07-24 17:25 | Read:182 | Comments:0 | Tags:Application Security CISO Cognitive Industries X-Force Resea

Achieve the Ultimate Data Protection for Your Trusted Digital Experience

The industry just gained another ally in the global fight against cybercrime with the launch of the new IBM z14 mainframe. With close to 70 percent of the world’s largest businesses — including those in banking, health care, insurance and retail — running on mainframes, IBM z not only increases power and speed to handle enormous transactions, but also
Publish At:2017-07-17 19:15 | Read:354 | Comments:0 | Tags:Mainframe Compliance Data Privacy Data Protection Encryption

Companies Around the World are Ramping Up for the GDPR — Is Yours?

This is the first installment in a two-part series. The General Data Protection Regulation (GDPR) is coming. It’s a wide-ranging law that requires both heightened protection for personal data and thorough notification to any European Union (EU) data subject whose personal data is breached. This applies to living individuals on EU soil, both citizens
Publish At:2017-07-10 21:30 | Read:396 | Comments:0 | Tags:Data Protection Compliance Data Privacy Data Security Genera

In Search of Equilibrium: Compliance and Security

The Moody Blues searched for the “Lost Chord,” Captain Kirk searched for Spock and the “In Search Of” television show sought to solve unexplained mysteries. Similarly, IT and security professionals are always searching for solutions that can balance myriad standards and regulations against a continuously evolving threat landscape. A
Publish At:2017-06-21 17:10 | Read:461 | Comments:0 | Tags:Data Protection Compliance Data Privacy immune system Privac

Embracing the GDPR as a Catalyst for Innovation

The General Data Protection Regulation (GDPR) is designed to govern how organizations manage the personal information of European Union (EU) citizens. Any company that conducts business in Europe or stores data belonging to EU citizens is impacted, no matter where it is based. Organizations that fail to comply by the time the regulation takes effect in May
Publish At:2017-06-05 14:15 | Read:502 | Comments:0 | Tags:CISO Data Protection Compliance Data Privacy General Data Pr

Zombie Cloud Data: What Your Delete Key May Not Delete

The convenience and flexibility of the cloud has transformed data storage for organizations and individual users alike. Cloud storage is especially useful for data that must be shared among multiple users or multiple devices. But for all its convenience, the cloud also adds a new complexity to the old security challenge of making sure that deleted data is
Publish At:2017-05-24 00:45 | Read:515 | Comments:0 | Tags:Cloud Security Data Protection Cloud Cloud Services Provider

MaaS360: A GDPR-Ready Unified Endpoint Management Solution

From a compliance perspective, the General Data Protection Regulation (GDPR) is a key focus area in global enterprises. This regulation was first introduced in January 2012 and will go live on May 25, 2018. Refined by input from the European Council, European Parliament and European Commission, the GDPR, unlike a directive, will be directly applicable in all
Publish At:2017-05-19 10:05 | Read:708 | Comments:0 | Tags:Data Protection Mobile Security Compliance Endpoint Manageme

Compliance Does Not Always Cure Health Care Security Woes

For organizations in highly regulated sectors such as health care, compliance with regulatory standards is not just a good idea; it’s the law. Moreover, there is a broad consensus that the regulatory standards are soundly based on security principles. Complaints about excessive or misguided regulations are not often heard. But the flip side of this r
Publish At:2017-05-14 01:10 | Read:359 | Comments:0 | Tags:Data Protection Health Care Compliance Data Privacy Endpoint

A Fast Start to Your Security Immune System

There has been a lot of talk about the importance of building a holistic security immune system. That is, an intelligent, integrated way to protect a network using information from many different sources, all of which is ingested by powerful analytics tools to help correlate, prioritize and act on security incidents. When I put together security transformati
Publish At:2017-05-14 01:10 | Read:464 | Comments:0 | Tags:CISO Network Risk Management Compliance Data Protection immu

More Than Meets the Eye: Five Common Misunderstandings About SIEM Solutions

Security information and event management (SIEM) is top-of-mind for many chief information security officers (CISOs). There are many common challenges related to the implementation of SIEM, some of which are rooted in false expectations and inconsistent views. This is a good reason to address five of the most common misunderstandings associated with SIEM, wh
Publish At:2017-05-14 01:10 | Read:410 | Comments:0 | Tags:Security Intelligence & Analytics Compliance IBM QRadar SIEM

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud