HackDig : Dig high-quality web security articles for hacker

See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management

The art and science known as risk management has been around for years. It is applied in a broad array of areas, including insurance, credit risk ratings, stock and other market risk ratings, foreign policy decisions, military responses and many others. The true irony is that, although risk management has been applied to many aspects of IT, such as change ma
Publish At:2017-09-14 21:10 | Read:3026 | Comments:0 | Tags:Data Protection Risk Management Data Breach Data Management

How IoT Data Analytics Will Give Businesses a Competitive Edge

According to McKinsey & Company, the potential economic impact of the IoT could reach $11 trillion per year in 2025, which is equivalent to around 11 percent of the world economy. Making that a reality will depend on the widespread use of Internet of Things (IoT) data analytics. Security analysts must ensure that devices are not just managed and monito
Publish At:2017-04-25 12:21 | Read:3394 | Comments:0 | Tags:Data Protection Endpoint Industries Analytics Big Data Big D

Lost thumb drives bedevil US banking agency

A U.S. banking regulator says an employee downloaded a large amount of data from its computer system a week before he retired and is now unable to locate the thumb drives he stored it on.The Office of the Comptroller of the Currency, which is a part of the Department of the Treasury, said the loss represented "a major information security incident" as it
Publish At:2016-10-28 18:25 | Read:2626 | Comments:0 | Tags:Regulation Legal Security Data Management

Survey says many companies want to phase out passwords

Don't be surprised if your company decides to do away with password logins. A new survey has found that most organizations are leaning toward phasing out password authentication.The results comes from Wakefield Research, which surveyed 200 IT decision makers in the U.S. last month. Sixty-nine percent of the respondents said they will probably do away wit
Publish At:2016-10-13 22:15 | Read:3282 | Comments:0 | Tags:Security Data Breach Data Management

Got big data? Check out these 100 best practices for keeping it secure

Big data is best known for its volume, variety, and velocity -- collectively referred to as the "3 Vs" -- and all three of those traits make security an elusive goal. Targeting companies grappling with that challenge, the Cloud Security Alliance on Friday released a new report offering 100 best practices.As its name would suggest, the CSA focuses on prom
Publish At:2016-08-26 23:10 | Read:3091 | Comments:0 | Tags:Security Cloud Computing Big Data Privacy Data Management

Researchers release free decryption tools for PowerWare and Bart ransomware

Security researchers have released tools this week that could help users recover files encrypted by two relatively new ransomware threats: Bart and PowerWare.PowerWare, also known as PoshCoder, was first spotted in March, when it was used in attacks against healthcare organizations. It stood out because it was implemented in Windows PowerShell, a
Publish At:2016-07-22 21:50 | Read:3388 | Comments:0 | Tags:Security Encryption Data Management Data Protection

TeslaCrypt victims can now decrypt their files for free

Victims of the widespread TeslaCrypt ransomware are in luck: Security researchers have created a tool that can decrypt files affected by recent versions of the malicious program.Surprisingly, the TeslaCrypt creators themselves helped the researchers.TeslaCrypt first appeared in early 2015 and stood out by targeting game-related user content, such as save
Publish At:2016-05-19 22:35 | Read:2861 | Comments:0 | Tags:Security Encryption Malware Data Protection Data Management

TMI? Security Intelligence Can Get You That ‘Manageable List’ You Need

Years ago I was texting with my teenage daughter, and she sent me a message saying “Oh Dad, TMI.” Now I tend to be pretty “with it” even though I am middle-aged, but back then I didn’t know what TMI stood for. And, of course, I didn’t want to admit that to her, so I Googled TMI and found out that it stood for “too mu
Publish At:2015-08-05 09:10 | Read:2600 | Comments:0 | Tags:Security Intelligence & Analytics Data Management Data Prote

OwnCloud's new encryption framework gives enterprises more flexibility

It’s no secret that security has been a tripping point for enterprises considering cloud storage, but OwnCloud on Tuesday took a fresh step toward alleviating such concerns with the addition of a new encryption framework.OwnCloud’s file, sync and share service offers an open-source and self-hosted alternative to platforms such as Box and Dropbox that’s desig
Publish At:2015-07-07 21:15 | Read:2163 | Comments:0 | Tags:Data Management Database Administration Big Data Security En

SAP Hana users warned of security vulnerability

Hard on the heels of the release of a newly updated version of SAP Hana, a security researcher has warned of a potentially serious vulnerability in the in-memory platform.“If an attacker can exploit this vulnerability, he can get access to all encrypted data stored in an SAP Hana database,” said Alexander Polyakov, CTO with ERPScan, which presented the detai
Publish At:2015-06-19 06:50 | Read:3180 | Comments:0 | Tags:Enterprise Resource Planning (ERP) ERP Security Security Dat

The Business of Cyber Risk Assessment for Data Security

Many organizations are grappling with a dearth of available options to effectively measure and assess cyber risk within a business context. Current data security solutions do not generally focus on or appropriately address cybersecurity risks in an enterprise environment. Effectively quantifying and qualifying IT risks within a corporate enterprise environme
Publish At:2015-04-15 17:30 | Read:2227 | Comments:0 | Tags:Data Protection Cybersecurity Data Management data-security

In Data Security, What’s Your Security Nirvana?

My colleague Nev Zunic and I recently shared one of our data security presentations at IBM InterConnect 2015. This conference was a great opportunity for us to discuss the data security landscape and share our knowledge with peers and clients. Our presentation shared some insight into modern enterprise data security and touched on our five-phase approach. Ba
Publish At:2015-03-18 16:35 | Read:2411 | Comments:0 | Tags:Data Protection Cybersecurity Data Management data privacy d

Big Data Requires Big Protection

Life used to be so much simpler, particularly when it came to data management. With centralized data and processing, you could just lock the computer room door and say goodnight. This may have been convenient for the data center staff, but it was far less so for end users. Back then, the focus was on structured data and nice tables of data in normalized form
Publish At:2015-03-06 16:20 | Read:2354 | Comments:0 | Tags:Data Protection Big Data Cloud Cybersecurity Data Management


Share high-quality web security related articles with you:)


Tag Cloud