HackDig : Dig high-quality web security articles for hacker

Internet-Connected Toys: Cute, Cuddly and Inherently Insecure

After the FBI issued a warning on internet-connected toys in July, researchers began digging into these devices to assess their functions as they relate to cybersecurity. But before describing what one of these toys can do, it might be helpful to explain how they work at a very high level. Typical Components of Internet-Connected Toys The first component of
Publish At:2017-09-18 17:25 | Read:169 | Comments:0 | Tags:Cloud Security Mobile Security Cloud Cloud Applications Conn

Increased Awareness Is the Best Cure for Health Care Security Risks

The health care market is quite heterogeneous, and as a result, each organization has a unique set of cybsersecurity needs and characteristics. The industry includes hospitals of all sizes, local doctoral consortia, public health care institutions and individual physicians. Naturally, health care security risks vary depending on the size and type of organiza
Publish At:2017-09-15 15:35 | Read:267 | Comments:0 | Tags:Data Protection Health Care Risk Management Chief Informatio

Cloud Security and the New Cold War: Corporate Strategies for Winning Digital Battles

Thirty years ago, the Cold War threatened to spill over from high-level espionage into full-blown warfare between the world’s two great superpowers. But there could be a new conflict on the horizon. Nature recently highlighted “The Darkening Web,” a new book by Alexander Klimburg, program director at The Hague Centre for Strategic Studies
Publish At:2017-08-11 15:05 | Read:331 | Comments:0 | Tags:Cloud Security Cloud Connected Devices Data Breach Data Prot

Viewing Cybersecurity From the Consumer’s Perspective

In recent years, cybersecurity has become a major disrupter across the globe. In a business landscape that depends on digitization and accelerated transactions, cybersecurity is crucial to both providers and consumers. Those consumers must consider cyber resilience when shopping for services or products, even if a vulnerability doesn’t directly affect
Publish At:2017-08-09 07:50 | Read:183 | Comments:0 | Tags:CISO Connected Devices consumers Cyber Resiliency Cybersecur

Master the Basics to Manage IoT Security Risks

The very term Internet of Things (IoT) can sound like the buzziest of buzzwords. We all know we need to be aware of and plan for it, but sifting through all the security guidance about the IoT can be overwhelming. Moving Beyond Buzzwords To help cut through the noise, IBM released a new report, “Smart Things Call for Smart Risk Management,” detai
Publish At:2017-08-04 01:45 | Read:458 | Comments:0 | Tags:Mobile Security Risk Management Cognitive Security Connected

Multipronged IoT Security to Help Realize the Value of IoT Solutions

The Internet of Things (IoT) is an exciting and innovative technology that can help businesses discover new growth areas and income streams. With all this innovation to differentiate in industry verticals and challenge traditional operating models, it’s easy to overlook IoT security, both in terms of its uniqueness and its importance. What Is Different
Publish At:2017-07-24 17:25 | Read:220 | Comments:0 | Tags:Application Security CISO Cognitive Industries X-Force Resea

The 21st-Century Real Estate Deal: How the Internet of Things Is Changing Commercial Real Estate

The commercial real estate (CRE) industry is on the verge of a major disruption: the Internet of Things (IoT). Technology is making its way into an industry that historically lacks the innovative spirit, and we’re beginning to see a drastic change in what it means to be a real estate broker. As client needs evolve, brokers must develop new skills to k
Publish At:2017-07-14 17:35 | Read:345 | Comments:0 | Tags:Mobile Security Network Automation Connected Devices Interne

Execute Your IoT Deployment by the Book

Organizations contemplating Internet of Things (IoT) deployment projects must look at both past and future challenges through the lens of security. Enterprise data security is not a new topic, but for many companies, IoT deployments present new challenges because they extend the perimeter by introducing thousands of additional endpoints, each of which repres
Publish At:2017-06-27 20:30 | Read:385 | Comments:0 | Tags:Endpoint Mobile Security Network Connected Devices Endpoint

Should We Disconnect to Improve IoT Security?

When I do media spots, interviewers often ask me, “What is the best single thing you can do to prevent cyberattacks?” I jokingly respond, “Unplug and turn off all your devices — it’s a 100 percent security solution!” Ironically, when discussing Internet of Things (IoT) security, some people believe turning all devices off is an
Publish At:2017-06-26 07:40 | Read:428 | Comments:0 | Tags:Mobile Security Network Risk Management Bring-Your-Own-Devic

The Looming Threat of Health Care IoT Devices

A computer generation or two ago, IT managers fought a futile uphill battle to prevent rogue PCs from infiltrating the workplace, a battle fought largely in the name of data security. Their thinking was that if IT couldn’t manage it, they couldn’t secure it. Is history repeating itself with health care IoT devices? Fast forward to the present h
Publish At:2017-05-15 14:00 | Read:899 | Comments:0 | Tags:Endpoint Health Care Network Connected Devices Health Care D

Who Is Responsible for IoT Security?

The Internet of Things (IoT) is exploding into the mainstream, even as the broader role of mobile applications in the enterprise expands. But concerns about mobile and IoT security are emerging even more rapidly. The challenge, in a nutshell, is that there are currently no clear lines of responsibility when it comes to IoT and mobile security. Applications a
Publish At:2017-05-03 13:10 | Read:597 | Comments:0 | Tags:Application Security Mobile Security Chief Information Secur

Five Ways in Which the IoT Will Disrupt Your Business

The Internet of Things (IoT) leverages network connections to communicate between devices and systems, and it is ready to disrupt your business. Enterprises are already deploying smart devices in may ways: Some IoT capabilities are designed to help organizations manage operations, while others are intended to improve customer-oriented products. In either cas
Publish At:2017-05-02 00:35 | Read:648 | Comments:0 | Tags:Endpoint Mobile Security Network Connected Devices Internet

How IoT Data Analytics Will Give Businesses a Competitive Edge

According to McKinsey & Company, the potential economic impact of the IoT could reach $11 trillion per year in 2025, which is equivalent to around 11 percent of the world economy. Making that a reality will depend on the widespread use of Internet of Things (IoT) data analytics. Security analysts must ensure that devices are not just managed and monito
Publish At:2017-04-25 12:21 | Read:1040 | Comments:0 | Tags:Data Protection Endpoint Industries Analytics Big Data Big D

Big Changes Around the Corner for the IoT

The Internet of Things (IoT) is a swamp that just doesn’t want to be drained. While there hasn’t been a huge alligator of a distributed denial-of-service (DDoS) attack in the last few months, it’s only a matter of time before a new one strikes. There are simply too many connected devices, many of which lack the built-in security to resist b
Publish At:2017-04-21 16:20 | Read:726 | Comments:0 | Tags:Endpoint Network Connected Devices Infrastructure Infrastruc

The Sky Is the Limit: Assessing the IoT Impact on Businesses

The Internet of Things (IoT), in which all manner of devices and things are connected, is enabling digital transformation in many walks of life. It’s also heralding the promise that we will soon live in hyperefficient smart cities. But how does this affect business? A recent report from The Economist Intelligence Unit (EIU) gauged the current IoT impac
Publish At:2017-04-19 09:05 | Read:583 | Comments:0 | Tags:Network & Endpoint Risk Management Connected Devices Connect

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud