HackDig : Dig high-quality web security articles for hacker

The Enemy Within: Identifying Insider Threats in Your Organization

Security professionals and managers are increasingly concerned that the leading information security risk to organizations comes from within. But despite the sinister overtones of this problem, insider threats are associated more with accidents and oversights than malicious actors. The danger is amplified by shortfalls in training and expertise, and the ch
Publish At:2017-06-22 11:35 | Read:138 | Comments:0 | Tags:Identity & Access Risk Management Critical Data Data Protect

In Search of Equilibrium: Compliance and Security

The Moody Blues searched for the “Lost Chord,” Captain Kirk searched for Spock and the “In Search Of” television show sought to solve unexplained mysteries. Similarly, IT and security professionals are always searching for solutions that can balance myriad standards and regulations against a continuously evolving threat landscape. A
Publish At:2017-06-21 17:10 | Read:168 | Comments:0 | Tags:Data Protection Compliance Data Privacy immune system Privac

Know the Odds: The Cost of a Data Breach in 2017

We’ve all heard that when it comes to experiencing a data breach, the question is not if it will happen, but when. You may be wondering about the actual odds of it happening to your organization. Think about it this way: The chances of being struck by lightning this year are 1 in 960,000. When it comes to experiencing a data breach, according to the Po
Publish At:2017-06-20 22:45 | Read:218 | Comments:0 | Tags:Data Protection Incident Response Security Services Cost of

A Brief History of Computing: As Technology Evolves, Cybersecurity Lags Behind

Security isn’t what it used to be, especially in the area of computing. It has become far more ephemeral, less obvious and much more important. To keep pace with the evolving threat landscape, we all need to reset our expectations about what cybersecurity actually is in today’s world and look carefully at what it might become. Early Computing In
Publish At:2017-06-19 09:55 | Read:108 | Comments:0 | Tags:Data Protection Network Security Intelligence & Analytics Co

The Power of the Security Immune System

The most common cyberattacks tend to follow the same pattern: An employee receives a fraudulent email and unwittingly exploits a vulnerability upon opening a malicious attachment, exposing sensitive data. Of course, there are countless variations — an unknown vulnerability, encrypted or exfiltrated data, a malware-laden hyperlink — and each one could result
Publish At:2017-06-17 02:40 | Read:214 | Comments:0 | Tags:Data Protection Incident Response Security Intelligence & An

Back to Basics: Six Simple Strategies to Strengthen Your Security Posture

Security threats can be scary, and the fear factor is understandable. Technological progress makes security a fast-moving target, with new and more sophisticated threats constantly emerging. The Internet of Things (IoT) is raising the stakes, putting the means of physical destruction in the hands of malicious actors. A sophisticated criminal underworld ecos
Publish At:2017-06-16 08:15 | Read:156 | Comments:0 | Tags:Risk Management Data Protection Passwords Patch Management S

Bringing Systems Integration Skills to Cybersecurity Degree Students

For the third year, the Warwick Manufacturing Group (WMG) at the University of Warwick will run the Enterprise Cyber Security (ECS) module, which is part of the institution’s Master of Science in Cyber Security and Management program. The individual degree modules offer students a solid set of security skills, culminating with the ECS module, which is
Publish At:2017-06-14 19:25 | Read:270 | Comments:0 | Tags:Data Protection Academia Cybersecurity Cybersecurity Trainin

Technology Treatment Plan: The Health Care Cybersecurity Imperative

Health care is under siege from cybersecurity threats. As noted by Healthcare IT News, another large-scale health insurance vendor recently shuttered its patient portal to deal with vulnerabilities that exposed personal data. Meanwhile, Beta News reported that 43 percent of all data breaches in the U.K. come from the health care sector. Now, the U.S. Departm
Publish At:2017-06-14 19:25 | Read:162 | Comments:0 | Tags:Data Protection Health Care Cybersecurity Legislation Federa

Asleep at the Switches: Don’t Let Cyber Fatigue Catch Your Enterprise Off Guard

Talk about cybersecurity is everywhere, from boardrooms to beach outings. But to chief information security officers (CISOs), it is more than conversation — it is the focus of their work. Just like thieves who rob from houses, cybercriminals target those who are least protected. That’s why awareness is critical to help security leaders combat cyber fa
Publish At:2017-06-12 12:10 | Read:247 | Comments:0 | Tags:CISO Data Protection Fraud Protection awareness training Pas

Securing Your Enterprise Assets While Traveling for Work

Traveling for work is a regular occurrence for many of us. Most of the time, traveling for client meetings, conferences, team meetings and other work-related activities also means taking a laptop or other portable devices traveling too. These devices could easily include your company’s IP, strategic plans, financials or other sensitive enterprise asset
Publish At:2017-06-08 16:05 | Read:287 | Comments:0 | Tags:Data Protection Endpoint Mobile Security Security Intelligen

50 hashes per hour

How often do you turn off your computer when you go home from work? We bet you leave it on so you don’t have to wait until it boots up in the morning. It’s possible that your IT staff have trained you to lock your system for security reasons whenever you leave your workplace. But locking your system won’t save your computer from a new type
Publish At:2017-06-06 08:30 | Read:233 | Comments:0 | Tags:Blog Research Data leaks Data Protection Linux Security Poli

Embracing the GDPR as a Catalyst for Innovation

The General Data Protection Regulation (GDPR) is designed to govern how organizations manage the personal information of European Union (EU) citizens. Any company that conducts business in Europe or stores data belonging to EU citizens is impacted, no matter where it is based. Organizations that fail to comply by the time the regulation takes effect in May
Publish At:2017-06-05 14:15 | Read:264 | Comments:0 | Tags:CISO Data Protection Compliance Data Privacy General Data Pr

Information Security in the Age of Disinformation

Depending on their specific goals and motivations, malicious external actors seek to blackmail individuals, organizations or security vendors to disrupt breach defenses or otherwise wreak havoc on IT operations. For security leaders tasked with defending against these threats, it’s hard to know who or what to believe. That challenge has only gotten wor
Publish At:2017-06-03 00:15 | Read:266 | Comments:0 | Tags:CISO Data Protection Chief Information Security Officer (CIS

Big Data Control Frameworks: Have Your Data and Control It Too

One of the fundamental requirements for big data users is big data control. Failure to properly store, audit and maintain data chain of custody undermines our individual and collective privacy. This failure also may be at odds with federal law and policy. Without data control, there is no data compliance. Fortunately, there is a host of big data analytics
Publish At:2017-06-01 11:15 | Read:319 | Comments:0 | Tags:Data Protection Identity & Access Big Data Big Data Analytic

Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications

Microsoft Office 365 is popular — very popular. In 2016, Gartner reported that 78 percent of enterprises surveyed used or planned to use Office 365. With access to a range of user activity events from a variety of sources, including Exchange Online, SharePoint Online and Azure Directory, how can Office 365 administrators correlate all this valuable data wit
Publish At:2017-05-26 08:10 | Read:330 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Security In


Share high-quality web security related articles with you:)


Tag Cloud