HackDig : Dig high-quality web security articles for hacker

Cybersecurity & Artificial Intelligence (AI) – a view from the EU Rear Window, Part I

Much has been said about the power of AI and how tomorrow’s CISO won’t be able to provide efficient cybersecurity without it. The hype surrounding AI is based on both the quickening pace of natural language capability development and the current deficiency of capable and competent cybersecurity professionals. A quick clarification of what AI is and to what e
Publish At:2019-12-06 16:45 | Read:465 | Comments:0 | Tags:Data Security artificial intelligence AI

Why all organizations must better protect sensitive data

About two weeks ago, National Cybersecurity Awareness Month (NCSAM) kicked off with a new message stressing personal responsibility for users keeping themselves safe online: “Own IT. Secure IT. Protect IT.” NCSAM asked users to consider best practices for both securing their own devices and protecting sensitive data. But personal responsibility in cyberse
Publish At:2019-10-17 23:20 | Read:713 | Comments:0 | Tags:Business cybersecurity cybersecurity awareness data security

Device & App Safety Guide for Families

While we talk about online safety each week on this blog, October is National Cybersecurity Awareness Month (NCSAM), a time to come together and turn up the volume on the digital safety and security conversation worldwide. To kick off that effort, here’s a comprehensive Device and App Safety Guide to give your family quick ways to boost safety and secu
Publish At:2019-10-06 11:20 | Read:1814 | Comments:0 | Tags:Family Safety #BeCyberSmart #NCSAM #CyberAware anonymous app

Insurance data security laws skirt political turmoil

Across the United States, a unique approach to lawmaking has proved radically successful in making data security stronger for one industry—insurance providers. The singular approach has entirely sidestepped the prolonged, political arguments that have become commonplace when trying to pass federal and state data privacy laws today. In California, for
Publish At:2019-09-25 23:20 | Read:1039 | Comments:0 | Tags:Privacy Anthem California California Consumer Privacy Act CC

Investigating IoT Crime in the Age of Connected Devices

People are beginning to get used to the easy life enabled by smart homes and the Internet of Things (IoT), but they are at risk if they do not prioritize security. The IoT has increased quality of life for many; it has helped the differently abled and the elderly to continue living independently and laid the technological groundwork for another industrial re
Publish At:2017-10-27 14:00 | Read:4532 | Comments:0 | Tags:Fraud Protection Mobile Security Security Intelligence & Ana

Three Tips to Help Your Organization Hit Data Protection Out of the Park

When implementing a new business plan or technology, it’s easy to draw parallels between coaching employees on best practices and coaching an athletic team in pursuit of a victory. Both require teamwork, extensive training and careful consideration of how the individual strengths of each player come together to create a cohesive working unit. As the Ma
Publish At:2017-10-23 17:50 | Read:5345 | Comments:0 | Tags:Data Protection Cybersecurity Training Data Breach Data Secu

How to Increase Transparency and Rebuild Trust After a Data Breach

As more companies suffer breaches and leak private data online, it becomes harder for organizations to be transparent and establish trust with their customers. Recent incidents have shown that many experts underestimated the total impact of a data breach in terms of the actual number of users affected and the volume of data made public. Many companies take t
Publish At:2017-10-22 05:00 | Read:4695 | Comments:0 | Tags:Application Security Data Protection Incident Response Data

Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl

As organizations march into the digital age, data sprawl is accelerating. Information of all kinds is stored everywhere, accessed by multiple people many times a day and shared across corporate and international boundaries. Most organizations do not have a handle on data locations, ownership and flows outside of regulated or compliance-related information. T
Publish At:2017-10-05 16:00 | Read:4705 | Comments:0 | Tags:Data Protection Critical Data Crown Jewels Data Breach Data

Back to Filing Cabinets? Simplifying the Complex Task of Data Security

Data drives our businesses, economy and daily lives, so it comes as no surprise that data security needs to be a priority. But do we know what data we really have, where sensitive information is being collected and stored, what is happening with the data and where it is ultimately going? How do we build security around critical assets that we need to protect
Publish At:2017-09-29 11:50 | Read:4571 | Comments:0 | Tags:Data Protection Data Classification Data Privacy Data Securi

GDPR Readiness: From Mission Impossible to Mission Accomplished

Your mission, should you choose to accept it, involves the identification and protection of the Personal Data of residents in the European Union (EU). You may select key data security solutions to aid you. You have only eight months to complete this mission. Continue reading for specific steps to take. This message will self-destruct in 10 seconds. Sound int
Publish At:2017-09-20 06:25 | Read:2797 | Comments:0 | Tags:Data Protection Data Security General Data Protection Regula

See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management

The art and science known as risk management has been around for years. It is applied in a broad array of areas, including insurance, credit risk ratings, stock and other market risk ratings, foreign policy decisions, military responses and many others. The true irony is that, although risk management has been applied to many aspects of IT, such as change ma
Publish At:2017-09-14 21:10 | Read:4475 | Comments:0 | Tags:Data Protection Risk Management Data Breach Data Management

Think You Have Plenty of Time to Plan for GDPR? Think Again

We all do it. We look at a deadline that’s months away and we tell ourselves we’ve got lots of time to think about it. In fact, that’s probably what you thought when you first heard about the European Union (EU) General Data Protection Regulation (GDPR), which takes effect May 25, 2018. Even now, it’s still months away — right? So w
Publish At:2017-09-12 13:50 | Read:3769 | Comments:0 | Tags:Banking & Financial Services Data Protection Compliance Data

The Time for IT Asset Management Is Now

The benefits of a comprehensive IT asset management (ITAM) program may seem obvious since it provides the data needed to strategically and tactically manage the life cycle of IT assets from purchase to end of life. Of course, companies can leverage IT asset management to reduce costs, improve operational efficiency, determine the full cost of existing invest
Publish At:2017-09-05 09:35 | Read:4419 | Comments:0 | Tags:Data Protection Asset Management Compliance Data Security En

The Educator’s Back-to-School Cybersecurity Checklist: Make Mitigating Command Injection a Priority

Pencils? Check. Notebooks? Check. Web applications and servers patched and sanitized? Hopefully. In many parts of the world, educators and students in primary, secondary and higher education institutions are reviewing their checklists to ensure academic preparedness for the new school year. But what about the education sector’s IT workers? What should
Publish At:2017-08-30 20:10 | Read:3413 | Comments:0 | Tags:Risk Management Threat Intelligence Academia Data Protection

Need-to-Know Only: Use Encryption to Make Data Meaningless to Prying Eyes

Organizations continue to be plagued by data breaches, and data is leaking from our enterprises in large quantities. However, data leakage is not the only issue. The problems — namely, regulatory fines, brand damage and lost revenue — begin when sensitive data that is readable and accessible falls into the wrong hands. Despite these concerns, security profes
Publish At:2017-08-29 10:15 | Read:3659 | Comments:0 | Tags:Data Protection Cryptography Data Security Encryption Encryp

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud