HackDig : Dig high-quality web security articles for hackers

#GartnerSEC: Cybersecurity Leaders Must Start Preparing for the Next Decade

Cybersecurity leaders need to prepare for the long-term picture as well as deal with current day-to-day issues, according to Toby Bussa, VP analyst at Gartner, speaking during the Gartner Security and Risk Virtual Summit.As we emerge from a decade of substantial change in the cybersecurity landscape, Bussa expects to see a similar evolution occur i
Publish At:2020-09-18 12:36 | Read:30 | Comments:0 | Tags: security cyber cybersecurity

DNI and Microsoft warn that multiple countries are trying to influence the elections

Microsoft, a multinational technology company headquartered in the USA, revealed in a blog post that hackers from foreign states have actively targeted people and organizations involved in the upcoming Presidential elections.  The attacks, predominantly coming from Iran, China, and Russia, have been aimed at people associated with both Joe Biden and Presiden
Publish At:2020-09-18 06:57 | Read:39 | Comments:0 | Tags:Mobile News News Security cybersecurity elections hacking

Risk Management: How Security Can Learn to Do the Math

Risk management is an important element in using data to get ahead of cybersecurity risks before they happen. The costs of protecting an enterprise of any size against cyber attacks continue to rise. Once a business truly understands the consequences of an incident, its leaders must decide how to manage the risk. They can choose to accept, reduce or av
Publish At:2020-09-16 21:17 | Read:89 | Comments:0 | Tags:CISO Risk Management Security Services Cybersecurity Financi

U.S. House Passes IoT Cybersecurity Bill

The U.S. House of Representatives this week passed the IoT Cybersecurity Improvement Act, a bill whose goal is to improve the security of IoT devices.First introduced in 2017 and reintroduced in 2019, the IoT Cybersecurity Improvement Act will now have to pass the Senate before it can be signed into law by the president.The bipartisan legislation is backed b
Publish At:2020-09-16 12:22 | Read:119 | Comments:0 | Tags:NEWS & INDUSTRY Vulnerabilities Management & Strateg

Cybersecurity Bounces Back, but Talent Still Absent

While the demand for cybersecurity talent rebounds, organizations will need to focus on cyber-enabled roles to fill immediate skills gaps. Leave it to a global pandemic to disrupt industries many of us have assumed to be stalwart. Companies fortunate enough not to traffic in hard goods are realizing they can survive (and cut significant costs) by moving to w
Publish At:2020-09-16 12:19 | Read:74 | Comments:0 | Tags: security cyber cybersecurity

Back to Basics: Creating a Culture of Cybersecurity at Work

The importance of security culture can be seen now more than ever. Many of us work remotely; there are app concerns; and the lines between personal and business use of devices and networks are blurred, challenging our cyber resilience. Therefore, despite all the great tools, frameworks and protective measures in place, we need to ensure people are doin
Publish At:2020-09-16 09:33 | Read:140 | Comments:0 | Tags:CISO Data Protection Security Services cybersecurity educati

Time to update your cybersecurity policy?

IntroductionIn today’s highly connected world, new cyberthreats and risks emerge seemingly every hour, around the clock. Whether it is from spearphishing, a distributed denial-of-service attack or a targeted piece of malware, connecting your organization’s systems and workstations to the internet always opens up the possibility of a cyberattack. Unfort
Publish At:2020-09-15 10:00 | Read:148 | Comments:0 | Tags:Security Awareness security cyber cybersecurity

Joint Cybersecurity Advisory on Threat Hunting and Incident Response Released

A joint cybersecurity advisory released on September 1st detailed technical methods for uncovering and responding to malicious activity including best practice mitigations and common missteps. A collaborative effort, this advisory (coded AA20-245A) is the product of research from the cybersecurity organizations of five nations. Those include the United State
Publish At:2020-09-15 01:50 | Read:104 | Comments:0 | Tags:Cyber Security advisory incident response threat security cy

Cybersecurity Leaders Oppose Voatz

A plea by a blockchain voting company for the US Supreme Court to consider good-faith security researchers a threat to cybersecurity has been opposed by industry leaders. The plea was put forward by the company Voatz in the form of an amicus brief submitted to the court in Nathan Van Buren v. United States on September 3.&n
Publish At:2020-09-14 16:17 | Read:134 | Comments:0 | Tags: security cyber cybersecurity

#GartnerSEC: Moving Towards an Explicit Zero Trust Model of Cybersecurity

The notion of zero trust in cybersecurity is a misunderstood term, according to Neil MacDonald, VP and distinguished analyst at Gartner. Speaking during the Gartner Security and Risk Virtual Summit, MacDonald noted that extending trust is in fact necessary for organizations to work efficiently.The main issue is too much “implicit trust” in existi
Publish At:2020-09-14 16:17 | Read:135 | Comments:0 | Tags: security cyber cybersecurity

Cybersecurity Tips for a Happy National Video Games Day

Reading Time: ~ 3 min. This year more than others, for many of us, it’s gaming that’s gotten us through. Lockdowns, uncertainty, and some pretty darn good releases have kept our computers and consoles switched on in 2020. GamesIndustry.biz, a website tracking the gaming sector, reported a record number of concurrent users on the gaming platform Steam for sev
Publish At:2020-09-11 10:17 | Read:100 | Comments:0 | Tags:Home + Mobile malware security cyber cybersecurity

4 Ways MSPs Can Fine Tune Their Cybersecurity Go-To-Market Strategy

Reading Time: ~ 4 min. Today’s work-from-home environment has created an abundance of opportunities for offering new cybersecurity services in addition to your existing business. With cyberattacks increasing in frequency and sophistication, business owners and managers need protection now more than ever. MSPs are ideally positioned to deliver the solution
Publish At:2020-09-10 18:39 | Read:131 | Comments:0 | Tags:Managed Service Providers security cyber cybersecurity

Cyber Work podcast: Fast-tracking the next-gen cybersecurity workforce with Vic Malloy

IntroductionIt’s no secret that the cybersecurity workforce gap continues to grow around the world. According to a study by IT security industry leader (ISC)², the current US workforce shortage is nearly 500,000 positions. To meet the demands of businesses today, the cybersecurity profession needs to grow 62%. Those striking numbers leave many industry
Publish At:2020-09-10 14:45 | Read:112 | Comments:0 | Tags:Cyber Work Podcast security cyber cybersecurity

Top 7 cybersecurity books for IT auditors in 2020

IntroductionBefore delving into top cybersecurity books for IT auditors, it is essential to have a short look at who IT auditors are.IT auditors are responsible for examining and evaluating the enterprise’s IT policies, operations and technological infrastructure. They make sure that corporate assets are properly protected and that data integrity is en
Publish At:2020-09-10 14:45 | Read:96 | Comments:0 | Tags:General Security security cyber cybersecurity

Cybersecurity Maturity Model Certification (CMMC) and Why You Should Care

The U.S. Department of Defense released the first version of the Cybersecurity Maturity Model Certification (CMMC) back on January 31, 2020. Since that time, there has been a flurry of different industry experts working towards helping clients understand and prepare for getting certified under CMMC. But what is it?The Cybersecurity Maturity Model Certificati
Publish At:2020-09-10 00:53 | Read:147 | Comments:0 | Tags:Regulatory Compliance certification CMMC Department of Defen

Tools

Tag Cloud