HackDig : Dig high-quality web security articles for hacker

Board Directors Need to Get Involved With Cyber Risk Governance

Board directors are under a lot of pressure. They know that it’s only a matter of time before their organization suffers a cyber incident, and all eyes will naturally be on the directors themselves to see if they were properly exercising their risk oversight. Directors also know that all interactions with the CISO will be subject to close scrutiny in t
Publish At:2017-08-24 16:50 | Read:199 | Comments:0 | Tags:CISO Risk Management Cyber Risk Cybersecurity Cybersecurity

From the Battlefield to the Security Operations Center: A New Collar Approach to the Skills Gap

Everyone in the industry knows that there is a huge demand for cybersecurity professionals and a worrying shortage of talent. In fact, Frost and Sullivan estimated that we will face 1.8 million unfilled cybersecurity positions by 2022. So how do we solve this problem — and fast? A recent executive report from the IBM Institute for Business Value (IBV) sugges
Publish At:2017-08-08 16:20 | Read:220 | Comments:0 | Tags:CISO Government Cybersecurity Jobs Cybersecurity Training Pr

Hire a Team of Hackers to Identify Vulnerabilities

It’s common to hear the phrase “never leave security to chance” in business. Given the rapid advancement and persistence of cybercrime, chief information security officers (CISOs) need the ability to deploy offensive security measures to protect their networks. One way to do this is to employ a team of hackers to proactively protect the or
Publish At:2017-08-04 20:10 | Read:759 | Comments:773 | Tags:CISO Risk Management Chief Information Security Officer (CIS

Why Red on Blue Is a Crucial Component of Cyber Skills and Incident Response Training

More and more companies are looking to cyber exercises and capture the flag events to improve their incident response effectiveness, upskill staff and tackle the cybersecurity talent gap. A red on blue experience provides a safe sandbox environment for participating companies to stress test their business processes and challenge their capabilities in respon
Publish At:2017-08-03 06:55 | Read:189 | Comments:0 | Tags:Incident Response Cybersecurity Jobs Cybersecurity Training

Cybercrime Awareness Should Be Fun

Companies experiencing a cyberattack certainly are not thinking about fun when they deal with the results. There’s a good chance that the breach happened because security awareness wasn’t a focus for an employee who simply clicked the wrong link or accessed the wrong website. Employees need to be educated about cyber risks, but training can be b
Publish At:2017-07-25 11:50 | Read:228 | Comments:0 | Tags:CISO Data Protection Risk Management Cybersecurity Training

Can AI and Machine Learning Help Fill the Cybersecurity Skills Gap?

Think about an industry that has had a huge labor problem for decades. Hiring managers can’t find enough skilled people, and it takes way too long to train someone to an effective level. With all of the advances in technology, why hasn’t there been a complete automation of procedures? The truth is that new technologies such as artificial intell
Publish At:2017-06-19 09:55 | Read:219 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

Bringing Systems Integration Skills to Cybersecurity Degree Students

For the third year, the Warwick Manufacturing Group (WMG) at the University of Warwick will run the Enterprise Cyber Security (ECS) module, which is part of the institution’s Master of Science in Cyber Security and Management program. The individual degree modules offer students a solid set of security skills, culminating with the ECS module, which is
Publish At:2017-06-14 19:25 | Read:464 | Comments:0 | Tags:Data Protection Academia Cybersecurity Cybersecurity Trainin

Inside the National CCDC: Building Cybersecurity Skills for the Future

It is no secret that we face a significant global cybersecurity skills shortage, with 1.8 million open and unfilled positions expected by 2022. As global leader of academic outreach for IBM Security, I am often asked what steps we can take to address the shortage and accelerate skills. My response is unwavering: There is no single answer, no silver bullet.
Publish At:2017-04-24 18:00 | Read:575 | Comments:0 | Tags:Security Intelligence & Analytics Academia Cybersecurity Cyb

Building a Cybersecurity Culture Around Layer 8

“Cybersecurity must accommodate and address the needs of people through process and cultural change.” — Gartner press release dated June 6, 2016 The term layer 8 is often used pejoratively by IT professionals to refer to employees’ lack of awareness and a weak overall cybersecurity culture. While organizations continue to purchase and deplo
Publish At:2017-03-08 04:55 | Read:847 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Cyber

An Education Initiative in Cognitive Application: How I Embarked on Designing a Master’s Course for GSU

Since 2015, I have been designing and administering graduate courses at Georgia State University (GSU) in areas such as big data, information security and data privacy. I find this not only fun, but also a great opportunity to provide real-life knowledge to aspiring IT students from all over the world. In one of the classes I taught last year, I had students
Publish At:2017-02-09 18:45 | Read:552 | Comments:0 | Tags:Cognitive Cognitive Computing Cognitive Security Cybersecuri


Share high-quality web security related articles with you:)


Tag Cloud