HackDig : Dig high-quality web security articles for hacker

Getting a Grip on GDPR: The Secret Is Knowing Where to Begin

An old friend once gave me some really valuable advice about reaching a goal. He said that you can’t get to where you’re going if you don’t know where you are. Over the years, I’ve found that to be true in a lot of situations. But I think it’s especially fitting in discussing GDPR readiness. Know Where You Stand With GDPR Readin
Publish At:2017-11-06 09:40 | Read:217 | Comments:0 | Tags:Data Protection Compliance Cybersecurity Legislation Data Pr

Investigating IoT Crime in the Age of Connected Devices

People are beginning to get used to the easy life enabled by smart homes and the Internet of Things (IoT), but they are at risk if they do not prioritize security. The IoT has increased quality of life for many; it has helped the differently abled and the elderly to continue living independently and laid the technological groundwork for another industrial re
Publish At:2017-10-27 14:00 | Read:183 | Comments:0 | Tags:Fraud Protection Mobile Security Security Intelligence & Ana

Financial Institutions Join Forces to Solve the Intensifying Cloud Compliance Dilemma

The intensifying regulation of cloud services has become a major threat to financial institutions’ growth and innovation. An overwhelming number of regional and jurisdictional mandates aimed at ensuring cloud security, data protection and privacy are consuming company resources. Compliance with these evolving and often conflicting regulatory demands ha
Publish At:2017-10-26 19:35 | Read:304 | Comments:0 | Tags:Banking & Financial Services Cloud Security Cloud Cloud Serv

How We Developed the IBM Security GDPR Framework

Why It’s So Hard to Design Something Simple In our previous blog post, Adam Nelson and I suggested that you set aside time with other people in your organization and familiarize yourselves with General Data Protection Regulation (GDPR) and its requirements. Have you done that yet? Don’t be embarrassed to admit that you haven’t. Because eith
Publish At:2017-10-02 14:15 | Read:308 | Comments:0 | Tags:Data Protection Compliance Data Privacy General Data Protect

Back to Filing Cabinets? Simplifying the Complex Task of Data Security

Data drives our businesses, economy and daily lives, so it comes as no surprise that data security needs to be a priority. But do we know what data we really have, where sensitive information is being collected and stored, what is happening with the data and where it is ultimately going? How do we build security around critical assets that we need to protect
Publish At:2017-09-29 11:50 | Read:288 | Comments:0 | Tags:Data Protection Data Classification Data Privacy Data Securi

Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges

Every chief information security officer (CISO) faces ongoing threats to his or her company’s assets. While some threats apply to every industry, IT security specialists in the health care, financial services, and energy and utilities sectors need to pay more attention to industry-specific security risks. Although these threats are most prevalent in th
Publish At:2017-09-26 09:56 | Read:240 | Comments:0 | Tags:Banking & Financial Services CISO Energy & Utility Health Ca

Leaking Cloud Databases and Servers Expose Over 1 Billion Records

As The Wall Street Journal recently pointed out, some clients of cloud service providers such as Amazon and Microsoft are accidentally leaving their cloud databases exposed due to misconfigurations of their services. Coupled with recent headline-making breaches, it’s becoming clear that the greatest risks to an organization might come down to a simple
Publish At:2017-09-21 19:15 | Read:288 | Comments:0 | Tags:Advanced Threats Cloud Security Data Protection Software & A

See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management

The art and science known as risk management has been around for years. It is applied in a broad array of areas, including insurance, credit risk ratings, stock and other market risk ratings, foreign policy decisions, military responses and many others. The true irony is that, although risk management has been applied to many aspects of IT, such as change ma
Publish At:2017-09-14 21:10 | Read:233 | Comments:0 | Tags:Data Protection Risk Management Data Breach Data Management

Think You Have Plenty of Time to Plan for GDPR? Think Again

We all do it. We look at a deadline that’s months away and we tell ourselves we’ve got lots of time to think about it. In fact, that’s probably what you thought when you first heard about the European Union (EU) General Data Protection Regulation (GDPR), which takes effect May 25, 2018. Even now, it’s still months away — right? So w
Publish At:2017-09-12 13:50 | Read:334 | Comments:0 | Tags:Banking & Financial Services Data Protection Compliance Data

The Security Leader’s Expanding Role: Seven Priorities to Drive CISO Success

The job of the chief information security officer (CISO) has changed from that of a security services manager to one that has responsibility across the entire enterprise. It has become a leadership position that requires organized thinking and detail-oriented concentration on a consistent basis. Given the rapid expansion and increasing sophistication of thre
Publish At:2017-09-05 09:35 | Read:266 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) Data Privacy

Leading by Example: Security and Privacy in the Education Sector

Today’s students will be the first generation entering adulthood with a digital footprint from birth, yet education is one of the most underexplored sectors when it comes to security and privacy. If we’re not careful about securing this data, we leave our children vulnerable to embarrassing — if not outright dangerous — situations. My experienc
Publish At:2017-08-22 09:31 | Read:362 | Comments:0 | Tags:Data Protection Risk Management Academia Data Privacy Data S

Achieve the Ultimate Data Protection for Your Trusted Digital Experience

The industry just gained another ally in the global fight against cybercrime with the launch of the new IBM z14 mainframe. With close to 70 percent of the world’s largest businesses — including those in banking, health care, insurance and retail — running on mainframes, IBM z not only increases power and speed to handle enormous transactions, but also
Publish At:2017-07-17 19:15 | Read:527 | Comments:0 | Tags:Mainframe Compliance Data Privacy Data Protection Encryption

Companies Around the World are Ramping Up for the GDPR — Is Yours?

This is the first installment in a two-part series. The General Data Protection Regulation (GDPR) is coming. It’s a wide-ranging law that requires both heightened protection for personal data and thorough notification to any European Union (EU) data subject whose personal data is breached. This applies to living individuals on EU soil, both citizens
Publish At:2017-07-10 21:30 | Read:497 | Comments:0 | Tags:Data Protection Compliance Data Privacy Data Security Genera

In Search of Equilibrium: Compliance and Security

The Moody Blues searched for the “Lost Chord,” Captain Kirk searched for Spock and the “In Search Of” television show sought to solve unexplained mysteries. Similarly, IT and security professionals are always searching for solutions that can balance myriad standards and regulations against a continuously evolving threat landscape. A
Publish At:2017-06-21 17:10 | Read:631 | Comments:0 | Tags:Data Protection Compliance Data Privacy immune system Privac

Embracing the GDPR as a Catalyst for Innovation

The General Data Protection Regulation (GDPR) is designed to govern how organizations manage the personal information of European Union (EU) citizens. Any company that conducts business in Europe or stores data belonging to EU citizens is impacted, no matter where it is based. Organizations that fail to comply by the time the regulation takes effect in May
Publish At:2017-06-05 14:15 | Read:679 | Comments:0 | Tags:CISO Data Protection Compliance Data Privacy General Data Pr

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud