HackDig : Dig high-quality web security articles

How to Protect Your Remote Workforce from a Cyberattack

Earlier this year, an industry report stated that 79% of businesses remain concerned about the security risks of an increasingly remote workforce. Cyberattacks are on the rise since the COVID-19 pandemic, in part because many organizations fail to put in place adequate cybersecurity measures and procedures.In addition, there is a worldwide shortage of cybers
Publish At:2022-06-26 21:07 | Read:309 | Comments:0 | Tags:Cyber Security Featured Articles cyberattack Remote working

Cyberthreat Defense Report 2022: Key Points You Should Know

Each year, CyberEdge publishes the Cyberthreat Defense Report (CDR). Aimed at IT security leaders, this comprehensive report outlines the threats, security issues, and industry concerns that are most pressing.Information summarized in the CDR is gathered through surveys conducted in 17 countries and 19 industries. Respondents are IT decision-makers in organi
Publish At:2022-06-20 02:14 | Read:231 | Comments:0 | Tags:Cyber Security Featured Articles Cyberthreat Report cyber

Reexamining the “5 Laws of Cybersecurity”

Nearly a year ago, journalist Martin Banks codified “Five Laws of Cybersecurity”. Cybersecurity is a complicated field, and any way to simplify its many facets into short, easy-to-remember maxims is always welcome. The five laws are a very good start towards developing a robust security program. The laws are:Treat everything like it’s vulnerable.Assume peopl
Publish At:2022-06-20 02:14 | Read:214 | Comments:0 | Tags:Cyber Security Featured Articles best practice cybersecurity

5 Potential Solutions to the Cybersecurity Talent Shortage

The most relevant cybersecurity threat to most businesses may be human, not technical. A sudden wave of cybercrime paired with longstanding tech labor challenges has created a cybersecurity skills gap, leaving companies without the expertise they need.Some companies lack dedicated security staff entirely, while others have a small, overworked department tryi
Publish At:2022-05-09 02:08 | Read:883 | Comments:0 | Tags:Cyber Security Featured Articles employees finding talent re

Building Cyber Resilience in a heightened alert environment

There has been a lot of talk about cyber weapons and the cyber dimension of global politics after the NotPetya and WannaCry attacks of 2017 and the Stuxnet worm, first discovered in 2010, when it was used to attack the control mechanisms of Iran’s uranium enriching centrifuges.Professor Ciaran Martin CB, former CEO of the UK National Cyber Security Centre (N
Publish At:2022-03-10 02:07 | Read:730 | Comments:0 | Tags:Cyber Security CISA Cyber Attacks cyber resilience NCSC risk

How to Stimulate Organizations’ Security Awareness Training Programs

We all know how important security awareness training is for an organization. Moreover, we try to enhance our efforts by weaving security into the “culture” of the organization. Yet, from the employee’s perspective, it all gets very stale. It seems like it is always the same message, but if that is the case, why hasn’t this knowledge been ado
Publish At:2022-03-03 02:07 | Read:808 | Comments:0 | Tags:Cyber Security cyber security culture Human Security Awarene

Prioritizing Cybersecurity Throughout All Web Development Sprints

No one doubts the importance of cybersecurity in web development — and yet, often in the development cycle, we neglect to prioritize it across each sprint and into the final product. Making cybersecurity a priority throughout every development sprint cycle is necessary to combat the tide of digital attacks threatening the modern web. But how can you ensure y
Publish At:2022-02-17 02:07 | Read:2134 | Comments:0 | Tags:Cyber Security best practice web development Web Security se

The Winter Olympics and Cybercrime: Caution Is Urged

Hosting the Olympics is always a source of national pride for any nation chosen to do so. Whether in winter or summer, the prestige of the world’s eyes being on an event that transcends political differences and has sport at the fore is a prize many countries and regions aspire to achieve.This all sounds fantastic and at one level is exactly what is happenin
Publish At:2022-02-15 09:58 | Read:1196 | Comments:0 | Tags:Cyber Security cybercrime data theft malware Olympic Games P

Tips for Defending Against Adversarial Actions Regardless of Their Origin

When an unfortunate event occurs, people tend to be curious about who was responsible for the event. It can be interesting and helpful to know who your enemy is and what their motives might be. But in cybersecurity, the primary focus is ultimately on preventative and detective measures to avoid similar issues.Let’s use a recent example to illustrate this poi
Publish At:2022-01-20 02:06 | Read:934 | Comments:0 | Tags:Cyber Security Adversary APT cyberattack IT OT Policies and

Key Considerations for Canada’s Forthcoming National Cyber Security Strategy

On December 16, Prime Minister Justin Trudeau released mandate letters tasking his ministers of national defense, foreign affairs, public safety, and industry to develop a new “National Cyber Security Strategy.” He specifically highlighted the need for the strategy to “articulate Canada’s long-term strategy to protect our national security and economy, deter
Publish At:2022-01-06 02:05 | Read:1142 | Comments:0 | Tags:Government Canada Cyber Security cybersecurity policy Securi

Protect Your Organization by Cultivating a Culture of Cybersecurity Awareness

The cybersecurity market offers excellent solutions and services to combat the threats that are exploited by cybercriminals. However, are these tools enough to fully protect an organization? It is clear that human error is a strong attack vector for many popular cybercrimes, so the best way to augment any security program is to create a cyber-aware
Publish At:2021-12-29 02:05 | Read:2447 | Comments:0 | Tags:Cyber Security cyber security culture cybersecurity awarenes

The State of Security in the UK: Lessons from the NCSC Report

The National Cyber Security Centre (NCSC) recently released its fifth annual review of the state of cybersecurity in the United Kingdom. The report is presented under five headings including an analysis of and response “The Threat,” advice for resilience, advances in threat detection and prevention technology, improving the cybersecurity eco
Publish At:2021-12-18 02:05 | Read:2106 | Comments:0 | Tags:Cyber Security Critical Infrastructure NCSC Report United Ki

How Building a Solid Foundation Will Help Grow Your Cybersecurity Program

Cybersecurity is such a broad subject that many times, an organization can become stifled when trying to develop a full cybersecurity program. Some organizations that have already put a cybersecurity program in place can also unpleasantly discover gaps in their efforts, making the entire venture seem moot. One way to effectively get started, as wel
Publish At:2021-12-14 02:05 | Read:1856 | Comments:0 | Tags:Cyber Security cybersecurity Policies and Procedures securit

State of Cybersecurity in Germany in 2021

According to Germany’s Federal Office for Information Security (BSI), the country faces a grave and growing threat as society becomes more digitally connected and criminals more sophisticated. The BSI said threat levels have reached red alarm levels.Threat level increasedBSI published their annual report “The State of IT Security in Germany in 2021.” I
Publish At:2021-12-08 02:05 | Read:3430 | Comments:0 | Tags:Cyber Security cybersecurity Germany security cyber

The UK pushes for better supply chain cybersecurity

If the UK Government gets its way, IT service vendors and other cloud-based service providers may soon be required to adopt new measures to strengthen their cybersecurity, amid rising concerns about supply chain risks.The Department for Digital, Culture, Media and Sport (DCMS) has floated plans to make mandatory compliance with the National Cyber Security Ce
Publish At:2021-11-18 11:10 | Read:1801 | Comments:0 | Tags:Regulatory Compliance Cyber Assessment Framework Cyber Secur

Announce

Share high-quality web security related articles with you:)
Tell me why you support me <3