HackDig : Dig high-quality web security articles for hacker

Leaking Cloud Databases and Servers Expose Over 1 Billion Records

As The Wall Street Journal recently pointed out, some clients of cloud service providers such as Amazon and Microsoft are accidentally leaving their cloud databases exposed due to misconfigurations of their services. Coupled with recent headline-making breaches, it’s becoming clear that the greatest risks to an organization might come down to a simple
Publish At:2017-09-21 19:15 | Read:142 | Comments:0 | Tags:Advanced Threats Cloud Security Data Protection Software & A

See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management

The art and science known as risk management has been around for years. It is applied in a broad array of areas, including insurance, credit risk ratings, stock and other market risk ratings, foreign policy decisions, military responses and many others. The true irony is that, although risk management has been applied to many aspects of IT, such as change ma
Publish At:2017-09-14 21:10 | Read:161 | Comments:0 | Tags:Data Protection Risk Management Data Breach Data Management

Think You Have Plenty of Time to Plan for GDPR? Think Again

We all do it. We look at a deadline that’s months away and we tell ourselves we’ve got lots of time to think about it. In fact, that’s probably what you thought when you first heard about the European Union (EU) General Data Protection Regulation (GDPR), which takes effect May 25, 2018. Even now, it’s still months away — right? So w
Publish At:2017-09-12 13:50 | Read:174 | Comments:0 | Tags:Banking & Financial Services Data Protection Compliance Data

The Security Leader’s Expanding Role: Seven Priorities to Drive CISO Success

The job of the chief information security officer (CISO) has changed from that of a security services manager to one that has responsibility across the entire enterprise. It has become a leadership position that requires organized thinking and detail-oriented concentration on a consistent basis. Given the rapid expansion and increasing sophistication of thre
Publish At:2017-09-05 09:35 | Read:134 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) Data Privacy

Leading by Example: Security and Privacy in the Education Sector

Today’s students will be the first generation entering adulthood with a digital footprint from birth, yet education is one of the most underexplored sectors when it comes to security and privacy. If we’re not careful about securing this data, we leave our children vulnerable to embarrassing — if not outright dangerous — situations. My experienc
Publish At:2017-08-22 09:31 | Read:158 | Comments:0 | Tags:Data Protection Risk Management Academia Data Privacy Data S

Achieve the Ultimate Data Protection for Your Trusted Digital Experience

The industry just gained another ally in the global fight against cybercrime with the launch of the new IBM z14 mainframe. With close to 70 percent of the world’s largest businesses — including those in banking, health care, insurance and retail — running on mainframes, IBM z not only increases power and speed to handle enormous transactions, but also
Publish At:2017-07-17 19:15 | Read:354 | Comments:0 | Tags:Mainframe Compliance Data Privacy Data Protection Encryption

Companies Around the World are Ramping Up for the GDPR — Is Yours?

This is the first installment in a two-part series. The General Data Protection Regulation (GDPR) is coming. It’s a wide-ranging law that requires both heightened protection for personal data and thorough notification to any European Union (EU) data subject whose personal data is breached. This applies to living individuals on EU soil, both citizens
Publish At:2017-07-10 21:30 | Read:396 | Comments:0 | Tags:Data Protection Compliance Data Privacy Data Security Genera

In Search of Equilibrium: Compliance and Security

The Moody Blues searched for the “Lost Chord,” Captain Kirk searched for Spock and the “In Search Of” television show sought to solve unexplained mysteries. Similarly, IT and security professionals are always searching for solutions that can balance myriad standards and regulations against a continuously evolving threat landscape. A
Publish At:2017-06-21 17:10 | Read:461 | Comments:0 | Tags:Data Protection Compliance Data Privacy immune system Privac

Embracing the GDPR as a Catalyst for Innovation

The General Data Protection Regulation (GDPR) is designed to govern how organizations manage the personal information of European Union (EU) citizens. Any company that conducts business in Europe or stores data belonging to EU citizens is impacted, no matter where it is based. Organizations that fail to comply by the time the regulation takes effect in May
Publish At:2017-06-05 14:15 | Read:502 | Comments:0 | Tags:CISO Data Protection Compliance Data Privacy General Data Pr

Big Data Control Frameworks: Have Your Data and Control It Too

One of the fundamental requirements for big data users is big data control. Failure to properly store, audit and maintain data chain of custody undermines our individual and collective privacy. This failure also may be at odds with federal law and policy. Without data control, there is no data compliance. Fortunately, there is a host of big data analytics
Publish At:2017-06-01 11:15 | Read:624 | Comments:0 | Tags:Data Protection Identity & Access Big Data Big Data Analytic

Compliance Does Not Always Cure Health Care Security Woes

For organizations in highly regulated sectors such as health care, compliance with regulatory standards is not just a good idea; it’s the law. Moreover, there is a broad consensus that the regulatory standards are soundly based on security principles. Complaints about excessive or misguided regulations are not often heard. But the flip side of this r
Publish At:2017-05-14 01:10 | Read:359 | Comments:0 | Tags:Data Protection Health Care Compliance Data Privacy Endpoint

Putting IoT Security Front and Center

The Internet of Things (IoT) is not just hype anymore. It is taking off at an enormous rate, and the predictions of 20 billion connected devices by 2020 now sound entirely likely. But as it takes off, so do IoT security challenges for both enterprises and consumers. Obstacles range from software updating issues to employee education and user privacy. But t
Publish At:2017-04-03 11:00 | Read:628 | Comments:0 | Tags:Mobile Security Network & Endpoint Connected Devices Data Pr

Online Services and Hospitality Security Go Hand in Hand

Online services face the same hospitality security challenges as traditional hotels and taxi companies. A online hospitality provider must ensure the security of its infrastructure, clientele and the points at which the two intersect. To dig into the topic, we queried major industry players and reviewed a plethora of open source materials to determine how ot
Publish At:2017-01-13 22:00 | Read:1364 | Comments:0 | Tags:CISO Cloud Security Data Protection Data Privacy Hospitality

Football and a Crystal Ball: Data Privacy Predictions for 2016

This time of year, predictions abound. I decided to go out on a limb and make a Super Bowl prediction to kick things off. I asked my resident football expert, my 14-year-old son, two questions: “What is a prediction?” and, “Who is going to win the Super Bowl?” His answers: “You use your data to predict what’s going to happ
Publish At:2016-01-28 17:25 | Read:807 | Comments:0 | Tags:Data Protection Big Data Data Breach Data Privacy Data Secur

Respecting Privacy, Safeguarding Data and Enabling Trust

Data Privacy Day is January 28, and this year’s theme examines issues around respecting privacy, protecting data and enabling trust. Today more than ever, any global company is a digitized company, which means that every company is grappling with challenges around privacy, security and trust. As a result, these challenges are no longer an IT-only responsibil
Publish At:2016-01-28 15:40 | Read:735 | Comments:0 | Tags:Security Cisco Security and Trust Organization Data Privacy


Share high-quality web security related articles with you:)


Tag Cloud