HackDig : Dig high-quality web security articles for hackers

Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl

As organizations march into the digital age, data sprawl is accelerating. Information of all kinds is stored everywhere, accessed by multiple people many times a day and shared across corporate and international boundaries. Most organizations do not have a handle on data locations, ownership and flows outside of regulated or compliance-related information. T
Publish At:2017-10-05 16:00 | Read:5521 | Comments:0 | Tags:Data Protection Critical Data Crown Jewels Data Breach Data

Five Steps to Protect Your Critical Data From Insider Threats

As companies around the world turn their attention to advanced threats endangering their most sensitive data, one category is commanding much-deserved attention: insider threats. With 44.5 percent of attacks perpetrated by malicious insiders, guarding against these incidents is becoming a pressing concern. An effective way to tackle insider threats is with a
Publish At:2017-03-16 18:50 | Read:4646 | Comments:0 | Tags:Data Protection Identity & Access Critical Data Crown Jewels

Data Discovery and Classification: Will You Do It or Let the Attackers Do It for You?

We’ve heard the phrase crown jewels a lot lately. We aren’t talking about royalty and alarmed glass enclosures, though. We’re talking about data classification — specifically, the most valuable data in the enterprise. This is the data that, if it falls into the wrong hands, could mean significant damage to a company, government, health care
Publish At:2016-01-19 16:25 | Read:3916 | Comments:0 | Tags:Data Protection Compliance Crown Jewels Data Classification

To Err Is Human: Why Your Users’ Identity Is Your Security’s Weakest Link

With 2014 sometimes called “The Year of the Breach,” many organizations have realized their most serious security threat isn’t the external attack. Instead, it’s the user who can compromise or leak the organization’s most sensitive data — its “crown jewels” — either intentionally or accidentally. According to IBMR
Publish At:2015-04-15 17:30 | Read:3639 | Comments:0 | Tags:Identity & Access crown jewels Cybersecurity data-security h

Data Security Goes Beyond Technology

The digital business environment brings tremendous opportunity — along with the risk of data breaches targeting important business data assets. This data is an essential component of decision-making, ongoing operations, market competitiveness and regulatory compliance. With so much value contained in business data, threats and attacks on an enterprise’
Publish At:2015-02-20 20:40 | Read:3908 | Comments:0 | Tags:Data Protection crown jewels Cybersecurity data-security IBM

Using Outlier Detection to Catch Sneaky Data Breaches

TMI: The Problem of Too Much Information in Data Security I am going to describe innovative technology based on machine learning, called “outlier detection,” in the context of data security. But first, let’s review why it’s so important for data breach detection to evolve beyond traditional, policy-based monitoring and auditing soluti
Publish At:2015-02-20 04:55 | Read:3819 | Comments:0 | Tags:Data Protection Security Intelligence & Analytics crown jewe

Data Classification: Crown Jewels or Costume Jewelry?

What’s the value? Data classification is hard. When I was working in the realm of credit card data as a Qualified Security Assessor (QSA), one of the things that I always found interesting was how companies protected their credit card data versus the rest of the data in their organization. Often, businesses had placed many additional controls around th
Publish At:2014-11-06 15:50 | Read:3419 | Comments:0 | Tags:Data Protection Risk Management business intelligence credit

IBM’s CISO Joanne Martin Provides Perspective on Security

Whether you work for a large global enterprise or a small- to medium-sized business, you know that you have a shared responsibility to keep your company’s data safe and secure. This is a responsibility you carry as you traverse through your day-to-day duties, and nowhere is it more evident than at IBM under Chief Information Security Officer (CISO) Joa
Publish At:2014-08-10 12:03 | Read:5043 | Comments:0 | Tags:CISO Chief Information Officer (CIO) Chief Information Secur


Tag Cloud