HackDig : Dig high-quality web security articles for hacker

What Can We Learn From the ‘Global State of Information Security Survey 2018’?

In October 2018, PricewaterhouseCoopers (PwC) released the latest edition of “The Global State of Information Security Survey.” For this report, the professional services firm surveyed over 9,000 leaders, including CEOs, chief financial officers (CFOs), chief information officer (CIOs) and chief information security officers (CISOs), from 122 cou
Publish At:2017-11-02 13:10 | Read:289 | Comments:0 | Tags:Risk Management Chief Information Officer (CIO) Chief Inform

Nine More NCSAM Tips for Cybersecurity Professionals: Week Four

What have you learned during National Cybersecurity Awareness Month (NCSAM) that could help drive change in your organization? We’ve featured 22 tips so far, so there should be at least a few things for you to work on. Maybe your company needs to revamp its cybersecurity training or do a better job managing data. As with anything in life, there is alwa
Publish At:2017-11-01 00:20 | Read:231 | Comments:0 | Tags:Risk Management Cybersecurity IBM IBM Security National Cybe

Don’t Panic! Create a Winning Cybersecurity Strategy to Preserve CISO Sanity

Stress comes with the territory for chief information security officers (CISOs). As noted by Medium, the job is unpredictable, with “long periods of preparing, watching, waiting, punctuated by periods of high stress and occasional bruising.” As both vendors and cyberthreats proliferate, finding a balance between an effective cybersecurity strateg
Publish At:2017-10-31 05:50 | Read:158 | Comments:0 | Tags:CISO Automation C-Suite Chief Information Security Officer (

Another Eight NCSAM Tips for Cybersecurity Professionals: Week Three

National Cybersecurity Awareness Month (NCSAM) is a great time to enhance employees’ security knowledge and skills. IT professionals should use it as an opportunity to improve their security training methods, review the tools they use, and test their cybersecurity plans and processes. Eight Lessons From Week Three of NCSAM During week one and week two
Publish At:2017-10-23 17:50 | Read:113 | Comments:0 | Tags:CISO Cybersecurity National Cyber Security Awareness Month (

In Its Fifth Year, European Cyber Security Month Shows Why Security Is a Shared Responsibility

October is European Cyber Security Month (ECSM). This marks the fifth anniversary of the initiative and builds on the activities started in previous years. The concept of a cybersecurity awareness month began in the U.S. 14 years ago with the aim of promoting cybersecurity for all computer users, from consumers to governments. Over time, many jurisdictions a
Publish At:2017-10-22 05:00 | Read:193 | Comments:0 | Tags:Data Protection Cybersecurity Cybersecurity Jobs Cybersecuri

Sink or Swim: Uniting the C-Suite, Sales and Security to Fight Advanced Cyberattacks

One of the most disturbing security trends over the last few years has been the rise of the meta attack. The scope of this type of attack is far larger and wider than a threat designed to achieve a specific goal. These advanced cyberattacks are so significant, in fact, that they could sink an entire organization if it doesn’t take the time to install l
Publish At:2017-10-06 10:25 | Read:189 | Comments:0 | Tags:CISO Incident Response Risk Management Advanced Attacks Adva

Cybersecurity Strategy, Risk Management and List Making

When confronted with the daunting task of developing a cybersecurity strategy, many people don’t know where to start. The quick answer is to make a list of the tasks required to accomplish the project, organize them by functional categories and determine what resources need to be brought together to accomplish the tasks on the list. This might seem lik
Publish At:2017-10-03 08:40 | Read:274 | Comments:0 | Tags:CISO Government Risk Management Cybersecurity Cybersecurity

National Cyber Security Awareness Month: The 2017 Outlook

National Cyber Security Awareness Month (NCSAM) starts Monday, Oct. 2. It’s a joint effort between private industry and public agencies to help companies and individuals make better cybersecurity choices. Here’s a look at the current state of cybersecurity and what NCSAM has planned this year. An Evolving Outlook on Cybersecurity 2017 has been a
Publish At:2017-10-02 14:15 | Read:343 | Comments:0 | Tags:Data Protection Risk Management Cybersecurity Cybersecurity

DNA virus brings malware full circle

In what sounds like a science fiction story, scientists have successfully infected a computer using a virus encoded in DNA. The experiment was designed to prove that DNA could be used to successfully infect computers in the future. During the test, engineers created an artificial strand of DNA and “programmed” malicious code inside it. The strand was then in
Publish At:2017-09-29 04:10 | Read:159 | Comments:0 | Tags:Malware Mobile News Antivirus cybersecurity Virus

Bionic employees and biohacking

Wireless chips are an increasingly important part of day-to-day life. We use contactless cards to pay for goods, they have replaced travel tickets, and many people even use embedded chips to access their offices at work. But almost every chip required another plastic card – pretty soon you end up with a wallet full of contactless cards. Which is why some ind
Publish At:2017-09-26 20:45 | Read:337 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers

From the Starship Enterprise to Your Enterprise: Eight Cybersecurity Lessons From ‘Star Trek’

Many people in the security industry today grew up watching “Star Trek,” from the original episodes to Next Generation, Deep Space Nine, Voyager, Enterprise and the many other series that followed. In anticipation of the upcoming “Star Trek: Discovery” series, we thought it would be a good time to remind our readers that, beyond the e
Publish At:2017-09-25 15:30 | Read:230 | Comments:0 | Tags:CISO Risk Management Cyber Risk Cybersecurity Incident Respo

The Impact of the Blockchain on Cybersecurity

Since its appearance in 2009, the concept of the blockchain has expanded past its initial use as the base of bitcoin into many other areas. By its nature, this distributed database provides the perfect platform for the management of cryptocurrency. But its features have attracted the attention of experts interested in a broad array of other applications. Pos
Publish At:2017-09-23 00:30 | Read:385 | Comments:0 | Tags:Security b2b blockchain cybersecurity

Locky ransomware strikes at Amazon

Locky is back! We’ve been closely monitoring the rebirth of the ransomware for quite some time. Since early last year, different variations of the ransomware have been periodically popping in and out. Last year we discussed the tricks of the malicious software and had a deeper look into how it works. As you may remember, the primary purpose of the malicious
Publish At:2017-09-22 06:05 | Read:266 | Comments:0 | Tags:Malware Mobile News cybersecurity Ransomware

Dangers Beyond Ransomware – the Risk of Spyware

There’s been a lot of talk recently about ransomware’s impact on the business environment. It would seem that the central role of this attack casts a shadow over one of the classic villains of cybersecurity: spyware. But a large percentage of today’s attacks suffered by companies today involve this malware. Its risks must not go neglected. Know your enemy On
Publish At:2017-09-15 08:00 | Read:280 | Comments:0 | Tags:Security b2b cybersecurity Spyware

Why is Online Voting Not a Good Idea?

Online voting could introduce great risk into the election system by threatening voters It’s the 21st century, and we are living in the future as technology is advancing at a rapid speed. It has never been easier to shop online and to do online banking. It is possible money will even cease to exist as blockchain digital currencies such as Bitcoin and Monero
Publish At:2017-09-12 06:15 | Read:348 | Comments:0 | Tags:Mobile News News Cybercrime cybersecurity Hackers

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud