HackDig : Dig high-quality web security articles for hackers

Creating Brand Trust: A Key Currency for Business

This is the first in a blog series about building and maintaining brand trust.  Brand trust has always been valuable for business, but the ways to develop it have changed a lot in the digital age. I’ve seen a dramatic shift in the last twenty years while I’ve worked in technology and development. In terms of both my personal and professiona
Publish At:2020-09-17 12:45 | Read:333 | Comments:0 | Tags:Data Protection Identity & Access Zero Trust digital trust C

Safeguard Sensitive Data With a Next-Generation Data Security Approach

There is no silver bullet when it comes to protecting sensitive data. No single security technology investment will eliminate the risk of data theft or a mistake exposing sensitive information. To proactively defend against attackers, enterprise security teams are learning that they need to collect and centralize security and compliance information from all
Publish At:2020-05-03 08:13 | Read:689 | Comments:0 | Tags:Data Protection Cloud Cloud Infrastructure Cloud Security Co

Achieve Flexibility in Business Through Digital Trust and Risk Management

I grew up watching professional football back in the 70s, when defenses were so good they had their own nicknames. The Pittsburgh Steelers had the “Steel Curtain,” the Miami Dolphins had the “No-Name Defense” and the Dallas Cowboys had the “Doomsday Defense.” The Cowboys’ defense was based on a newfangled concept cal
Publish At:2020-04-21 10:39 | Read:1031 | Comments:0 | Tags:CISO digital trust Business Continuity Customer Experience D

How CIAM Addresses the Challenges of Consumer Identity Management

Consumer identities are at the heart of brand engagements today. Digital interactions are a routine part of our lives and touchpoints for consumers have reached astounding heights. Nearly 60 percent of the world is digitally connected and more than half of the world’s population will be using social media by the middle of 2020, according to We Are Soci
Publish At:2020-03-19 08:08 | Read:1054 | Comments:0 | Tags:Identity & Access Security Services Business Continuity Comp

A Proposed New Trust Framework for Physical and Digital Identity Interactions

Identity is a difficult term to define in the cybersecurity world. The range of personal information that can be associated with an identity interaction is highly dependent on the situational context of the interaction. The definition of identity also depends on the context of the medium within which it is exchanged. In the physical world, when we talk about
Publish At:2020-03-13 07:59 | Read:1300 | Comments:0 | Tags:Identity & Access Collaboration Compliance Customer Experien

How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk

Retail businesses, from mom-and-pop shops to major department stores, are investing heavily in technology to enhance the in-store experience. With the imminent arrival of mainstream 5G, smarter systems are expected to dominate the retail space as the internet of things (IoT) expands. But as we know from connected device deployments in other sectors, such as
Publish At:2020-03-11 08:47 | Read:873 | Comments:0 | Tags:Retail IoT Access Management Connected Devices Customer Expe

Workforce Versus Consumer IAM: Key Differences and Use Cases

As a consumer, have you ever visited an online retail site only to be bombarded by a pop-up window asking for your email address in order to get a nominal discount? Or consider the process of exploring a home mortgage with a major financial institution. Your first interaction with the bank or financial institution prompts a request for your Social Security i
Publish At:2020-03-02 08:32 | Read:851 | Comments:0 | Tags:Identity & Access Security Services Access Management Authen

IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions

I switched banks years ago. My former bank’s financial services and benefits were average when compared to other banks, but something in particular triggered my decision to switch. I had developed a bad online user experience, and especially a bad feeling about identity and access management (IAM). The online banking website had some clunky functionali
Publish At:2017-02-22 02:00 | Read:4523 | Comments:0 | Tags:CISO Identity & Access Authentication customer experience Id

Inconvenient Security: When Attorneys Drive Security Decisions

The Choice Escrow fraud liability case was once again in the news as an appellate court denied its request for a rehearing of its case against BancorpSouth over wire fraud liability. Choice Escrow was found responsible for a $440,000 online wire fraud in 2010, primarily because it refused to use dual authorization security offered by the bank for wire transf
Publish At:2014-08-18 22:40 | Read:4809 | Comments:0 | Tags:Fraud Protection bank customers banking Choice Escrow custom