HackDig : Dig high-quality web security articles for hackers

Winning with Cyber Threat Intelligence: Taking a More Personal View

In this final article of our trilogy, we investigate how a cyber threat intelligence (CTI) analyst and associated programmes provide insight about physical and cyber threats to your organisation. The value of these insights is reflected in the wins, which come as a result of context building, holistic understanding, and enhanced awareness in order to outmano
Publish At:2020-05-24 09:53 | Read:173 | Comments:0 | Tags:Security Awareness Cyber Threats threat analysis threat inte

ENISA Threat Landscape Report 2016, who is attacking us, and how?

ENISA has issued the annual ENISA Threat Landscape Report 2016, a document that synthesizes the emerging trends in cyber security The European Union Agency for Network and Information Security (ENISA) is an EU Agency composed of security experts that work with these states, public organizations and private groups to develop advice and recommendations on go
Publish At:2017-02-09 19:50 | Read:5131 | Comments:0 | Tags:Breaking News Cyber Crime Cyber warfare Data Breach Deep Web

Kaspersky Lab launched the new Lab ICS-CERT

Kaspersky Lab has launched a new global computer emergency response team (CERT), the Kaspersky Lab ICS-CERT, focusing on industrial control systems (ICS).. Kaspersky has anticipated launching an Industrial Control Systems CERT. Of course, I’m joking, anyway I always sustained that the creation of a similar structure represents an important achievement
Publish At:2016-10-25 23:40 | Read:3428 | Comments:0 | Tags:Breaking News Security CERT cyber threats Hacking ICS Kasper

What is a SOC (Security Operations Center)?

What is a SOC? What is its mission? Which are the Security tools and technology components of a SOC? Here come all the answers. A definition What is a SOC? A Security Operations Center (SOC) is an organized and highly skilled team whose mission is to continuously monitor and improve an organization’s security posture while preventing, detecting, analyzing, a
Publish At:2016-05-24 18:50 | Read:5758 | Comments:0 | Tags:Breaking News Security cyber security cyber threats Pierluig

Interview with Troels Oerting on cybersecurity in modern organizations

An interview with Troels Oerting on the cyber security in modern organizations and the importance of the role of the Chief Information Security Officer. The role of the chief information security officer (CISO) has profoundly changed over the years, from IT security management to high-level risk management. Today a CISO is a crucial figure in any organisatio
Publish At:2016-02-12 20:10 | Read:4004 | Comments:0 | Tags:Breaking News Security banking CISO cyber security cyber thr

ENISA Threat Landscape 2015, a must reading

ENISA has issued the annual ENISA Threat Landscape 2015 a document that synthesizes the emerging trends in cyber security I’m very happy to announce the publication of the annual ENISA Threat Landscape 2015 (ETL 2015), this is the fifth report issued by the European Agency. The ENISA Threat Landscape 2015 summarizes top
Publish At:2016-01-28 18:30 | Read:3990 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Hacking Reports Securi

Incidents at Federal Government Agencies increased more than 1,000 percent since 2006

According to a new report by the Government Accountability Office (GAO), The Federal Government needs for stronger controls across Federal Agencies. According to a report submitted as testimony by Greg Wilshusen, director of information security issues at GAO, in a recent congressional hearing cybersecurity incidents that invo
Publish At:2015-07-20 08:55 | Read:3582 | Comments:0 | Tags:Breaking News Reports Security cyber security cyber threats

Cyber threats scare a society increasingly dependent on technology

Experts estimated that between 25 to 50 billion devices will be connected to the internet by 2020 will be exposed to an increasing number of cyber threats. Until the end of 2020, experts estimated that between 25 to 50 billion devices on the planet will be connected to the internet, and counting that the Internet of Thing will
Publish At:2015-05-13 21:30 | Read:3110 | Comments:0 | Tags:Breaking News Cyber Crime Cyber warfare Hacking cyber threat

Obama signed an executive order as deterrent against hacking

A new executive order signed by the US President Obama imposes sanctions against every entities that is threatening US assets, even overseas hackers The President of United States, Barack Obama has signed an executive order that uses economic restrictions to “control” anyone that is trying to attack any American in
Publish At:2015-04-03 18:15 | Read:3148 | Comments:0 | Tags:Breaking News Laws and regulations critical infrastructure c

Obama Declares Cyber Threats A National Emergency

Today, President Obama declared a national emergency and signed an executive order empowering the government to impose sanctions against anyone viewed as a cyberthreat to the United States.This is a rather historic day for our industry, where the importance of information security has evolved from the IT department, to the boardroom, into politics and now, c
Publish At:2015-04-01 16:20 | Read:2900 | Comments:0 | Tags:Latest Security News Cyber Threats Executive Order Obama

Weaknesses in Air Traffic Control Systems are a serious issue for FAA

A GAO report to FAA reveals that the systems adopted in the Aviation industry are still affected by weaknesses that could be exploited by hackers. A report published by Government Accounting Office (GAO) in January urges the Federal Aviation Administration (FAA) to adopt a formal process to “Address Weaknesses in Air Tra
Publish At:2015-03-04 17:30 | Read:4428 | Comments:0 | Tags:Breaking News Security auditing cyber security cyber threats

Obama's Executive Order urges Companies to Share CyberSecurity Threat Data

President Barack Obama signed an executive order on Friday that encourages and promotes sharing of information on cybersecurity threats within the private sector and between the private sector companies and the government agencies as well.AREAS TO IMPROVEDuring his speech at the White House Cybersecurity Summit at Stanford University in California, where m
Publish At:2015-02-20 06:26 | Read:3622 | Comments:0 | Tags:cyber security Cyber threats cybersecurity Cybersecurity Fra

Cybercrime – UNICRI study analyzed risks for the economy and enterprises

UNICRI published a study on the impact of the cybercrime on the economy in the Europen region with a specific focus on the effect suffered by enterprises. The UNICRI has recently published a study titled “Cybercrime and the risks for the economy and enterprises at the European Union and Italian level” that analyzed
Publish At:2015-02-03 06:50 | Read:4767 | Comments:0 | Tags:Cyber Crime Security cyber threats Cybercrime EU information

Reading the ENISA Threat Landscape 2014 report

The European Union Agency for Network and Information Security has published the annual report on the cyber threat landscape “ENISA Threat Landscape 2014.” The European Union Agency for Network and Information Security (ENISA) has published the annual report on the cyber threat landscape “ENISA Threat Landsca
Publish At:2015-01-27 19:15 | Read:3717 | Comments:0 | Tags:Cyber Crime Hacking Security 2014 black markets cyber threat


Share high-quality web security related articles with you:)