HackDig : Dig high-quality web security articles for hackers

Help Reinforce Privacy Through the Lens of GDPR

The General Data Protection Regulation (GDPR) marked its two-year anniversary in May 2020 as one of the “toughest privacy and security” regulations, according to the European Union. GDPR has triggered a global movement of maturing privacy and data protection laws with stricter requirements. Meanwhile, the global COVID-19 pandemic is affecting da
Publish At:2020-08-12 09:10 | Read:88 | Comments:0 | Tags:Data Protection General Data Protection Regulation (GDPR) Pr

SANS Institute Says 28,000 User Records Exposed in Email Breach

The SANS Institute has disclosed a security incident which resulted in 28,000 records of personally identifiable information (PII) being forwarded to an unknown email address.The breach was discovered on August 6, during the review of email configuration and rules, according to the U.S.-based organization, which specializes in cybersecurity training, certifi
Publish At:2020-08-12 08:52 | Read:67 | Comments:0 | Tags:NEWS & INDUSTRY Email Security Incident Response Data Pr

Data Security Company Symmetry Systems Emerges From Stealth

Symmetry Systems, a provider of data store and object security (DSOS) solutions, emerged from stealth mode on Tuesday with $3 million in seed funding from ForgePoint Capital and Prefix Capital.Symmetry Systems was founded by Mohit Tiwari, a former cybersecurity professor at the University of Texas, and Casen Hunger, one of Tiwari’s former students. The compa
Publish At:2020-08-11 09:30 | Read:81 | Comments:0 | Tags:NEWS & INDUSTRY Identity & Access Cloud Security Dat

Data Democratization: Balancing Risk vs Reward Through Data Governance

Expanding employees’ access to the company’s data, known as data democratization, can be controversial. A more open attitude to data within the enterprise can give people the tools to fuel innovation and improve their bottom lines. However, it also can pose problems with security if not properly rolled out. As businesses work towards unleashing
Publish At:2020-08-11 07:00 | Read:121 | Comments:0 | Tags:Uncategorized Data Protection Data Security Governance Risk

Vendor Management: 7 Tips for Security During Remote Work

Third-party vendor management can be a risk to an organization’s data and network security. Enterprises depend on vendors to use security best practices that meet company standards while using their services when they have access to the company network. But that was when most people were working from their company’s physical place of business an
Publish At:2020-08-10 09:10 | Read:129 | Comments:0 | Tags:Data Protection Risk Management remote workforce Third-Party

Capital One Fined $80 Million in Data Breach

The U.S. Treasury Department has fined Capital One $80 million for careless network security practices that enabled a hack that accessed the personal information of 106 million of the bank’s credit card holders.The Comptroller of the Currency said in a consent order Thursday that Capital One failed in 2105 to establish effective risk management when it migra
Publish At:2020-08-07 07:55 | Read:95 | Comments:0 | Tags:NEWS & INDUSTRY Incident Response Data Protection Cyberc

The Digital Ship is Full of Leaks. But There Are Ways to Keep it Afloat.

Years ago, while anchoring the CBS Evening News during an on-air mishap, Dan Rather made an offhand remark, observing that “To err is human.  But to really screw up, you need a computer.” His observation was, to be sure, somewhat facetious, although the power of digital technology to amplify small mistakes and oversights into massive ones is real.
Publish At:2020-08-03 15:10 | Read:168 | Comments:0 | Tags:INDUSTRY INSIGHTS Risk Management Data Protection

How Employing Encryption for Data Security Changed History

Human history is full of examples of encryption playing pivotal roles in war, competition and transitions of power. Throughout recorded time, people have employed encryption as a tactical tool to keep information private. That data could involve military campaigns, plots to overthrow political leaders or political dealings. In some cases, the use of en
Publish At:2020-08-03 12:25 | Read:118 | Comments:0 | Tags:Data Protection Cybersecurity data encryption Data Security

Build a Roadmap for Cyber Resilience

The current information security landscape is rapidly evolving. According to the latest research from IBM Security and the Ponemon Institute’s 2020 Cyber Resilient Organization Report, 67% of organizations reported that the volume of attacks had significantly increased over the past 12 months. It’s not just the amount of attacks that grew; 64% o
Publish At:2020-08-03 08:33 | Read:128 | Comments:0 | Tags:CISO Data Protection Endpoint Advanced Attacks Advanced Thre

Microsoft to Keep Exploring TikTok Deal After Talks With Trump

Microsoft announced Sunday it would continue talks to acquire the US operations of popular video-sharing app TikTok, after meeting with President Donald Trump who seemingly backed off his earlier threats to ban the Chinese-owned platform."Following a conversation between Microsoft CEO Satya Nadella and President Donald J Trump, Microsoft is prepared to conti
Publish At:2020-08-03 07:27 | Read:78 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Privacy Compliance Risk

Autofill Through Biometric Authentication Coming to Chrome

Google this week announced a series of security and ease-of-use improvements for the Autofill feature in Chrome.Designed to help users fill in forms in a secure manner, everywhere on the web, Autofill is about to become more secure when it comes to credit card numbers, Google says.For those users who save credit cards in their Google Accounts, Chrome typical
Publish At:2020-07-31 12:20 | Read:160 | Comments:0 | Tags:NEWS & INDUSTRY Identity & Access Data Protection

Bill Aimed at Ending 'Warrant-Proof' Encryption Introduced in House

Roughly one month after United States senators introduced a “balanced” bill that would require tech companies to provide law enforcement with access to encrypted user data, a companion bill was introduced in the House of Representatives this week.Referred to as the Lawful Access to Encrypted Data Act, the bill aims to put a stop to criminals using “warrant-p
Publish At:2020-07-31 09:57 | Read:86 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Compliance Data Protection Track

DDoS Attacks Increase in Size, Frequency and Duration

Distributed denial of service (DDoS) attacks are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. Kaspersky also found that DDoS cyberattacks are increasing in duration. Average attack
Publish At:2020-07-30 19:37 | Read:86 | Comments:0 | Tags:Advanced Threats Application Security Cloud Security Data Pr

What’s New in the 2020 Cost of a Data Breach Report

In a world of uncertainty and change, it’s a comfort that some things are consistent year after year. Now in its 15th year, the annual Cost of a Data Breach Report, with research by the Ponemon Institute and published by IBM Security, continues to provide a detailed view of the financial impacts security incidents can have on organizations, with histo
Publish At:2020-07-29 08:52 | Read:122 | Comments:0 | Tags:Data Protection Threat Intelligence Threat Research Cost of

Darknet Cybersecurity: How Finance Institutions Can Defend Themselves

Financial firms continue to move to digital-first deployments, as retail branches close, and people shift to remote work. This shift makes understanding and preventing even common darknet, or dark web, threats a priority. Financial cybersecurity investment institutions need to understand what the dark web is, provide their security teams with the tools to ex
Publish At:2020-07-28 17:26 | Read:168 | Comments:0 | Tags:Advanced Threats Data Protection Identity & Access Threat In

Tools

Tag Cloud