HackDig : Dig high-quality web security articles for hackers

Getting Ahead of the EU General Data Protection Regulation (GDPR)

The fact that you’re reading this blog means that you’re probably familiar with the EU GDPR, the possible impact it may have on your business, and the consequences should you find yourself on the wrong side of non-compliance – especially if that non-compliance is highlighted as the result of a breach in which identifiable personal data is comprom
Publish At:2016-12-08 08:22 | Read:4918 | Comments:0 | Tags:Connecting Security to the Business Featured Articles data b

Identifying Cyber Risks: The Important Role of Senior Management

It is becoming more and more evident that cybersecurity is one of the focal points regarding security risks in the twenty-first century for all organisations.It is understandable that almost every organisation that has access to any kind of computing devices will be at risk and will probably experience harmful cyber incidents. Hackers, whether via individual
Publish At:2016-08-02 00:25 | Read:9033 | Comments:0 | Tags:Connecting Security to the Business Featured Articles Risk M

Finding the Balance Between Security and Productivity

The majority of employees within an organisation are hired to execute specific jobs, such as marketing, managing projects, manufacturing goods and overseeing financial investments. Their main – sometimes only – priority is to efficiently complete their core business activity, so information security is usually only a secondary consideration.Consequently, emp
Publish At:2016-07-26 03:55 | Read:5261 | Comments:0 | Tags:Connecting Security to the Business Featured Articles busine

GDPR is Coming – Penalty Primer

It has been eight months since the Court of Justice for the European Union struck down the 15-year-old Safe Harbor arrangement between the EU and US. At the time, there was a good deal of consternation over the future of EU-US data exchange and just how businesses would continue to operate.Despite several fits and starts, parties on both sides of the pond wo
Publish At:2016-07-18 12:55 | Read:6954 | Comments:0 | Tags:Connecting Security to the Business Featured Articles data G

Top 10 Security Tips For Businesses That Utilize The Cloud

Businesses must evolve their security practices in order to keep pace with ever-changing technology and the associated security threats. If they don’t, the cost of a data breach can be devastating.According to the 2016 Cost of Data Breach Study published by the Ponemon Institute, the average total cost of a data breach is $4 million, and the average cost of
Publish At:2016-07-14 17:30 | Read:3586 | Comments:0 | Tags:Connecting Security to the Business Featured Articles Cloud

CISO Resolutions for 2016

2015 was an eventful year for cyber security. Major vulnerabilities, including Superfish, “No iOS Zone” and CVE-2015-2502 made waves in the infosec community, as did a variety of criminal collectives – including Lizard Squad, Phantom Squad and DD4BC – that use distributed denial-of-service (DDoS) attack campaigns to get what they want.Let’
Publish At:2015-12-30 07:25 | Read:5008 | Comments:0 | Tags:Connecting Security to the Business Featured Articles 2016 C

Point of Sale Cyber Crime: The Gift that Keeps on Giving

In spite of the continual headlines about data breaches, there is a continuous effort to improve the security of credit card transactions by the financial services industry.Banks want to accomplish this to avoid incurring the expenses associated with fraudulent purchases and investigations efforts. Consumers want this, so they don’t have to deal with the has
Publish At:2015-10-29 14:30 | Read:8897 | Comments:0 | Tags:Connecting Security to the Business Featured Articles credit

Takeaways From The 2016 PwC Global State of Information Security Survey

Now in its 18th year, The Global State of Information Security® Survey 2016 – a worldwide survey by CIO, CSO and PwC – observes a fundamental shift in the way business leaders are responding to today’s biggest security challenges.Recognizing the rising cyber risks, a growing number of boards and executives are taking action to improve their organization’s se
Publish At:2015-10-23 14:30 | Read:4817 | Comments:0 | Tags:Connecting Security to the Business Featured Articles Risk-B

Homo Sapiens and the Human Equation of Ethics

I recall engaging into a conversation with a fellow security professional this year on the subject of where the CISO role should reside and to whom they should report. My opponent’s opinion was very much contrary to my own, vocalising the value of the CISO having full alignment with the Main Board and the Company Executive. I on the other hand feel they [the
Publish At:2015-10-02 07:20 | Read:4775 | Comments:0 | Tags:Connecting Security to the Business Featured Articles CISO e

Relevance and Context: The Keys to Unlocking Your Board’s Cyber Security Literacy

Tripwire recently hosted a webcast entitled, “Talking To The Board: How To Improve Your Board’s Cyber Security Literacy — UK Edition.”For the presentation, Amar Singh, Interim CISO and Founder of both Cyber Management Alliance and Give01Day, an organization that connects volunteer information security professionals together with charities seeking
Publish At:2015-09-28 13:40 | Read:6256 | Comments:0 | Tags:Connecting Security to the Business Featured Articles Amar S

The Top 10 Tips for Building an Effective Security Dashboard

Today, enterprises must grapple with a panoply of numerous and highly sophisticated threats. In response to this dangerous landscape, it is no wonder that businesses are increasingly turning to security dashboards – a powerful communication vehicle for all information security professionals.An effective security dashboard provides personnel, ranging from sec
Publish At:2015-09-24 21:40 | Read:8068 | Comments:0 | Tags:Connecting Security to the Business Featured Articles CISO I

Board Talk: How to Improve Your Board’s Cyber Security Literacy

With security breaches such as Sony, WHSmith and Ashley Madison hitting the headlines every week, the level of security awareness among the general public has never been higher.You could therefore be forgiven for thinking that (at least theoretically) it would be an easy task to impress the importance of information security matters on a board of directors.B
Publish At:2015-09-10 05:45 | Read:3791 | Comments:0 | Tags:Connecting Security to the Business Featured Articles breach

Sheep vs Cyber Insurance

Given the threats implicated by ongoing, successful cyber incursions facilitating unauthorised access to sensitive materials and leading to other forms of the related exposure of people, it would seem to make very good sense to turn to cyber insurance for an additional level of protection to the organisation – albeit in the negative reactive mode.But then I
Publish At:2015-09-10 05:45 | Read:3508 | Comments:0 | Tags:Connecting Security to the Business Featured Articles Ashley

What To Do When a Security Implementation Goes Badly

You took the time to engage your stakeholders; you planned; you tested; you began to execute; and then the implementation went awry. It happens to the best of us. There are just times when something doesn’t go according to plan.In the article “3 Ways to Implement Your Security Needs in Collaboration with Business Stakeholders,” I outlined critical steps to e
Publish At:2015-09-09 12:10 | Read:4011 | Comments:0 | Tags:Connecting Security to the Business Featured Articles Infose

Exploiting the Social Media Security Conundrum

It is 2015, and social media is everywhere. It is embedded in your smartphone, and its logos are printed on nearly every product packaging.A few years ago, having an online presence by way of a website for a company was enough. Today, consumers expect a company to have a presence on the App Store, Play Store, and every social media platform out there.It has
Publish At:2015-08-27 07:35 | Read:4431 | Comments:0 | Tags:Connecting Security to the Business Featured Articles CIA Pe

Tools

Tag Cloud