HackDig : Dig high-quality web security articles for hacker

Investigating IoT Crime in the Age of Connected Devices

People are beginning to get used to the easy life enabled by smart homes and the Internet of Things (IoT), but they are at risk if they do not prioritize security. The IoT has increased quality of life for many; it has helped the differently abled and the elderly to continue living independently and laid the technological groundwork for another industrial re
Publish At:2017-10-27 14:00 | Read:190 | Comments:0 | Tags:Fraud Protection Mobile Security Security Intelligence & Ana

Three Tips to Help Your Organization Hit Data Protection Out of the Park

When implementing a new business plan or technology, it’s easy to draw parallels between coaching employees on best practices and coaching an athletic team in pursuit of a victory. Both require teamwork, extensive training and careful consideration of how the individual strengths of each player come together to create a cohesive working unit. As the Ma
Publish At:2017-10-23 17:50 | Read:184 | Comments:0 | Tags:Data Protection Cybersecurity Training Data Breach Data Secu

How to Increase Transparency and Rebuild Trust After a Data Breach

As more companies suffer breaches and leak private data online, it becomes harder for organizations to be transparent and establish trust with their customers. Recent incidents have shown that many experts underestimated the total impact of a data breach in terms of the actual number of users affected and the volume of data made public. Many companies take t
Publish At:2017-10-22 05:00 | Read:431 | Comments:0 | Tags:Application Security Data Protection Incident Response Data

Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl

As organizations march into the digital age, data sprawl is accelerating. Information of all kinds is stored everywhere, accessed by multiple people many times a day and shared across corporate and international boundaries. Most organizations do not have a handle on data locations, ownership and flows outside of regulated or compliance-related information. T
Publish At:2017-10-05 16:00 | Read:339 | Comments:0 | Tags:Data Protection Critical Data Crown Jewels Data Breach Data

Back to Filing Cabinets? Simplifying the Complex Task of Data Security

Data drives our businesses, economy and daily lives, so it comes as no surprise that data security needs to be a priority. But do we know what data we really have, where sensitive information is being collected and stored, what is happening with the data and where it is ultimately going? How do we build security around critical assets that we need to protect
Publish At:2017-09-29 11:50 | Read:304 | Comments:0 | Tags:Data Protection Data Classification Data Privacy Data Securi

GDPR Readiness: From Mission Impossible to Mission Accomplished

Your mission, should you choose to accept it, involves the identification and protection of the Personal Data of residents in the European Union (EU). You may select key data security solutions to aid you. You have only eight months to complete this mission. Continue reading for specific steps to take. This message will self-destruct in 10 seconds. Sound int
Publish At:2017-09-20 06:25 | Read:252 | Comments:0 | Tags:Data Protection Data Security General Data Protection Regula

See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management

The art and science known as risk management has been around for years. It is applied in a broad array of areas, including insurance, credit risk ratings, stock and other market risk ratings, foreign policy decisions, military responses and many others. The true irony is that, although risk management has been applied to many aspects of IT, such as change ma
Publish At:2017-09-14 21:10 | Read:233 | Comments:0 | Tags:Data Protection Risk Management Data Breach Data Management

Think You Have Plenty of Time to Plan for GDPR? Think Again

We all do it. We look at a deadline that’s months away and we tell ourselves we’ve got lots of time to think about it. In fact, that’s probably what you thought when you first heard about the European Union (EU) General Data Protection Regulation (GDPR), which takes effect May 25, 2018. Even now, it’s still months away — right? So w
Publish At:2017-09-12 13:50 | Read:372 | Comments:0 | Tags:Banking & Financial Services Data Protection Compliance Data

The Time for IT Asset Management Is Now

The benefits of a comprehensive IT asset management (ITAM) program may seem obvious since it provides the data needed to strategically and tactically manage the life cycle of IT assets from purchase to end of life. Of course, companies can leverage IT asset management to reduce costs, improve operational efficiency, determine the full cost of existing invest
Publish At:2017-09-05 09:35 | Read:678 | Comments:0 | Tags:Data Protection Asset Management Compliance Data Security En

The Educator’s Back-to-School Cybersecurity Checklist: Make Mitigating Command Injection a Priority

Pencils? Check. Notebooks? Check. Web applications and servers patched and sanitized? Hopefully. In many parts of the world, educators and students in primary, secondary and higher education institutions are reviewing their checklists to ensure academic preparedness for the new school year. But what about the education sector’s IT workers? What should
Publish At:2017-08-30 20:10 | Read:292 | Comments:0 | Tags:Risk Management Threat Intelligence Academia Data Protection

Need-to-Know Only: Use Encryption to Make Data Meaningless to Prying Eyes

Organizations continue to be plagued by data breaches, and data is leaking from our enterprises in large quantities. However, data leakage is not the only issue. The problems — namely, regulatory fines, brand damage and lost revenue — begin when sensitive data that is readable and accessible falls into the wrong hands. Despite these concerns, security profes
Publish At:2017-08-29 10:15 | Read:467 | Comments:0 | Tags:Data Protection Cryptography Data Security Encryption Encryp

Location! Location! Location! Managing and Protecting Critical Data in the Age of Sprawl

It should be no surprise to anyone that the digital age has created data sprawl. Information and critical data are no longer confined to desks and filing cabinets in locked rooms, but stretched across the enterprise in locations far and wide. Data locations first expanded to structured databases, then unstructured local user systems and then file shares. As
Publish At:2017-08-28 12:55 | Read:406 | Comments:0 | Tags:Data Protection Critical Data Data Classification Data Secur

Leading by Example: Security and Privacy in the Education Sector

Today’s students will be the first generation entering adulthood with a digital footprint from birth, yet education is one of the most underexplored sectors when it comes to security and privacy. If we’re not careful about securing this data, we leave our children vulnerable to embarrassing — if not outright dangerous — situations. My experienc
Publish At:2017-08-22 09:31 | Read:741 | Comments:0 | Tags:Data Protection Risk Management Academia Data Privacy Data S

The Power of Pervasive Encryption

The new z14 mainframe computer offers a chance to re-evaluate what a mainframe can do for an organization. Gone are the days when the mainframe was the only way to do computing. Today, there are new and different choices, and the z14 can make those choices practical. The z14 features standard improvements that users have come to expect, such as faster, mor
Publish At:2017-08-15 11:45 | Read:692 | Comments:0 | Tags:Data Protection Mainframe Compliance Cryptography Data Secur

Seeing Data Security Breaches With Your Own Eyes

Although you can never truly predict the unexpected, most security applications attempt to do just that. They use attack models built to defend against security breaches that follow known patterns or model behaviors using a series of assumptions about exceptions. The attacks that do get through expose the uncomfortable truth that determined attackers can sur
Publish At:2017-08-10 20:40 | Read:445 | Comments:0 | Tags:Data Protection Access Management Cost of a Data Breach Data

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud