HackDig : Dig high-quality web security articles for hacker

Leading by Example: Security and Privacy in the Education Sector

Today’s students will be the first generation entering adulthood with a digital footprint from birth, yet education is one of the most underexplored sectors when it comes to security and privacy. If we’re not careful about securing this data, we leave our children vulnerable to embarrassing — if not outright dangerous — situations. My experienc
Publish At:2017-08-22 09:31 | Read:66 | Comments:0 | Tags:Data Protection Risk Management Academia Data Privacy Data S

Shrink Your Enterprise Cloud Computing Security Concerns With a Cloud Vendor Risk Management Program

According to a recent Forrester report, enterprise cloud computing adoption accelerated in 2016 and will do so again in 2017. Software-as-a-service (SaaS) remains the largest portion of the public cloud market, with global spending expected to reach $105 billion in 2017 and $155 billion by 2020. Infrastructure-as-a-service (IaaS) and platform-as-a-service (
Publish At:2017-08-22 09:30 | Read:75 | Comments:0 | Tags:Cloud Security Risk Management Cloud Cloud Adoption Cloud Co

Government Agencies Must Work With the Private Sector to Bolster Infrastructure Security

Securing data is never easy. It often requires the infusion of outside expertise to put together an effective information security strategy. Data stored on government servers is especially valuable to both individual fraudsters and nation-state actors, and government agencies have been under pressure to enhance their infrastructure security capabilities and
Publish At:2017-08-18 13:25 | Read:64 | Comments:0 | Tags:Data Protection Government Cybersecurity Cybersecurity Frame

The Power of Pervasive Encryption

The new z14 mainframe computer offers a chance to re-evaluate what a mainframe can do for an organization. Gone are the days when the mainframe was the only way to do computing. Today, there are new and different choices, and the z14 can make those choices practical. The z14 features standard improvements that users have come to expect, such as faster, mor
Publish At:2017-08-15 11:45 | Read:137 | Comments:0 | Tags:Data Protection Mainframe Compliance Cryptography Data Secur

Cloud Security and the New Cold War: Corporate Strategies for Winning Digital Battles

Thirty years ago, the Cold War threatened to spill over from high-level espionage into full-blown warfare between the world’s two great superpowers. But there could be a new conflict on the horizon. Nature recently highlighted “The Darkening Web,” a new book by Alexander Klimburg, program director at The Hague Centre for Strategic Studies
Publish At:2017-08-11 15:05 | Read:182 | Comments:0 | Tags:Cloud Security Cloud Connected Devices Data Breach Data Prot

Seeing Data Security Breaches With Your Own Eyes

Although you can never truly predict the unexpected, most security applications attempt to do just that. They use attack models built to defend against security breaches that follow known patterns or model behaviors using a series of assumptions about exceptions. The attacks that do get through expose the uncomfortable truth that determined attackers can sur
Publish At:2017-08-10 20:40 | Read:214 | Comments:0 | Tags:Data Protection Access Management Cost of a Data Breach Data

Eight Myths Not to Believe About Penetration Testing

Penetration testing — the process of trying to break into one’s own system to find vulnerabilities before cybercriminals do — is an integral part of information security. The data gleaned from these evaluations can help companies remediate flaws in their security infrastructure before fraudsters have a chance to expose them. Dispelling Eight Penetratio
Publish At:2017-08-10 20:40 | Read:156 | Comments:0 | Tags:Data Protection Risk Management Data Breaches Penetration Te

Pervasive Encryption Simplifies Mainframe Security

On July 17, IBM unveiled its z14 mainframe server, which combines the traditional mainframe hardware with new capabilities in areas such as cloud, cognitive, analytics, application management, blockchain, machine learning and more. Most importantly, z14 includes enhanced security features — namely, pervasive encryption — to help clients stay one step ahead
Publish At:2017-08-04 20:10 | Read:308 | Comments:0 | Tags:Data Protection Mainframe Application Security Encryption En

To Fight Cybercriminals, Follow the Money Trail

Follow the money! That is the famous first rule for investigating white collar criminal activity. It should also be the first rule for protecting your organization from a data breach, ransomware attack or other malicious activity. A basic fact of modern cybersecurity life is that the lone hacker of yore has long since vanished, replaced by sophisticated cy
Publish At:2017-08-01 18:05 | Read:187 | Comments:0 | Tags:Fraud Protection Network Cybercrime Cybercriminals Dark Web

Mainframe Data Is Your Secret Sauce: A Recipe for Data Protection

We in the security field like to use metaphors to help illustrate the significance of data in the enterprise. I’m a big fan of cooking, so I’ll use the metaphor of a secret sauce. Think about it: Each transaction basically reflects your organization’s unique relationship with a customer, supplier or partner. By sheer quantity alone, mainfra
Publish At:2017-07-31 23:40 | Read:206 | Comments:0 | Tags:Data Protection Mainframe Compliance Encryption Mainframe Se

Is Cloud Security a Safe Bet for Highly Sensitive Government Data?

Security is the primary focus of any government agency. One of the most obvious pitfalls of these agencies moving highly sensitive data to the cloud is that they surrender control to a third party. Moreover, nothing on the internet is truly secure, and all data is vulnerable to attacks and threats. The exposure footprint to those threats is staggering unde
Publish At:2017-07-28 21:55 | Read:156 | Comments:0 | Tags:Cloud Security Data Protection Government Cloud Adoption Clo

Estonia to Build Off-Site Data Center in Luxembourg

Lots of companies have disaster recovery data centers located far from their headquarters, but Estonia is the first government to build an off-site data center in another country. The small Baltic nation will make backup copies of its critical data infrastructure and store them in Luxembourg if agreements between the two countries are reached. The idea is th
Publish At:2017-07-27 00:40 | Read:200 | Comments:0 | Tags:Data Protection Government Critical Infrastructure Data Cent

Four Things You Should Know About the GDPR

May 25, 2018 will mark a “before and after” in the field of data protection legislation. That day will see Europe’s GDPR (General Data Protection Regulation) come into effect. Although the date of its entry into force was 25 May 2016, when the two-year transition period stipulated by the legislation is up, any company that violates the requirements of this r
Publish At:2017-07-26 17:05 | Read:178 | Comments:0 | Tags:Security b2b data protection gdpr Privacy

Cybercrime Awareness Should Be Fun

Companies experiencing a cyberattack certainly are not thinking about fun when they deal with the results. There’s a good chance that the breach happened because security awareness wasn’t a focus for an employee who simply clicked the wrong link or accessed the wrong website. Employees need to be educated about cyber risks, but training can be b
Publish At:2017-07-25 11:50 | Read:160 | Comments:0 | Tags:CISO Data Protection Risk Management Cybersecurity Training

Who Is Responsible for Cloud Security?

When implementing cloud projects, security is one of the most important issues. It requires companies to identify and understand the risks inherent to digitization, public networks and outsourcing of infrastructure components. Companies still fear that their data is insecure with cloud systems. IT professionals want to apply the same level of security to t
Publish At:2017-07-24 17:25 | Read:191 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Cloud Cloud

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud