HackDig : Dig high-quality web security articles for hackers

How to Ensure Secure and Complete Data Destruction

Data security means keeping data out of the wrong hands. This is especially important when storage media is no longer usable and needs to be decommissioned. The data must be truly destroyed, for both security and compliance.  The trouble is ‘deleting’ data doesn’t really delete data. It’s still possible to extract data from
Publish At:2020-08-17 10:00 | Read:247 | Comments:0 | Tags:Data Protection Risk Management Big Data Corporate Data Crit

Take a Data-Centric Approach to Zero Trust to Protect Your Most Critical Assets

For many of us, children are our most critical assets. In order to protect what is important to us, we work hard to know where they are and what they are doing at all times — particularly during those pesky teen years. We also take steps to protect the places where they spend their time. We install cameras, locks and alarm systems to monitor activity and sec
Publish At:2020-04-13 06:40 | Read:792 | Comments:0 | Tags:Data Protection digital trust Cloud Cloud Security Critical

Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl

As organizations march into the digital age, data sprawl is accelerating. Information of all kinds is stored everywhere, accessed by multiple people many times a day and shared across corporate and international boundaries. Most organizations do not have a handle on data locations, ownership and flows outside of regulated or compliance-related information. T
Publish At:2017-10-05 16:00 | Read:5674 | Comments:0 | Tags:Data Protection Critical Data Crown Jewels Data Breach Data

Location! Location! Location! Managing and Protecting Critical Data in the Age of Sprawl

It should be no surprise to anyone that the digital age has created data sprawl. Information and critical data are no longer confined to desks and filing cabinets in locked rooms, but stretched across the enterprise in locations far and wide. Data locations first expanded to structured databases, then unstructured local user systems and then file shares. As
Publish At:2017-08-28 12:55 | Read:4185 | Comments:0 | Tags:Data Protection Critical Data Data Classification Data Secur

Is Cloud Security a Safe Bet for Highly Sensitive Government Data?

Security is the primary focus of any government agency. One of the most obvious pitfalls of these agencies moving highly sensitive data to the cloud is that they surrender control to a third party. Moreover, nothing on the internet is truly secure, and all data is vulnerable to attacks and threats. The exposure footprint to those threats is staggering unde
Publish At:2017-07-28 21:55 | Read:5237 | Comments:0 | Tags:Cloud Security Data Protection Government Cloud Adoption Clo

The Enemy Within: Identifying Insider Threats in Your Organization

Security professionals and managers are increasingly concerned that the leading information security risk to organizations comes from within. But despite the sinister overtones of this problem, insider threats are associated more with accidents and oversights than malicious actors. The danger is amplified by shortfalls in training and expertise, and the ch
Publish At:2017-06-22 11:35 | Read:4961 | Comments:0 | Tags:Identity & Access Risk Management Critical Data Data Protect

Five Steps to Protect Your Critical Data From Insider Threats

As companies around the world turn their attention to advanced threats endangering their most sensitive data, one category is commanding much-deserved attention: insider threats. With 44.5 percent of attacks perpetrated by malicious insiders, guarding against these incidents is becoming a pressing concern. An effective way to tackle insider threats is with a
Publish At:2017-03-16 18:50 | Read:4764 | Comments:0 | Tags:Data Protection Identity & Access Critical Data Crown Jewels

Securing the Nonprofit

Running an IT security department in a nonprofit or charitable agency is very different from what’s found in a typical for-profit corporation. I spoke to David Goodman, who has held CIO jobs in a variety of nonprofits and is now the CIO-in-residence for NetHope, a membership organization serving the needs of the CIOs from 43 of the largest internationa
Publish At:2015-09-11 17:40 | Read:2985 | Comments:0 | Tags:CISO C-Suite Cloud Cloud Security Critical Data Cybersecurit

Tools

Tag Cloud