HackDig : Dig high-quality web security articles for hacker

Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl

As organizations march into the digital age, data sprawl is accelerating. Information of all kinds is stored everywhere, accessed by multiple people many times a day and shared across corporate and international boundaries. Most organizations do not have a handle on data locations, ownership and flows outside of regulated or compliance-related information. T
Publish At:2017-10-05 16:00 | Read:146 | Comments:0 | Tags:Data Protection Critical Data Crown Jewels Data Breach Data

POS Malware Breach Sees Payment Cards Hit Underground Shops

News about POS malware breaches affecting two retailers hit the headlines last week, this time featuring a fast-food restaurant chain in the U.S. that operates around 3,500 locations across the country, most of which are franchised, and a popular supermarket. Both entities, like others before them, were notified of suspicious activity by a third-party servic
Publish At:2017-10-04 03:05 | Read:237 | Comments:0 | Tags:Data Protection Fraud Protection Malware Retail Threat Intel

How We Developed the IBM Security GDPR Framework

Why It’s So Hard to Design Something Simple In our previous blog post, Adam Nelson and I suggested that you set aside time with other people in your organization and familiarize yourselves with General Data Protection Regulation (GDPR) and its requirements. Have you done that yet? Don’t be embarrassed to admit that you haven’t. Because eith
Publish At:2017-10-02 14:15 | Read:154 | Comments:0 | Tags:Data Protection Compliance Data Privacy General Data Protect

National Cyber Security Awareness Month: The 2017 Outlook

National Cyber Security Awareness Month (NCSAM) starts Monday, Oct. 2. It’s a joint effort between private industry and public agencies to help companies and individuals make better cybersecurity choices. Here’s a look at the current state of cybersecurity and what NCSAM has planned this year. An Evolving Outlook on Cybersecurity 2017 has been a
Publish At:2017-10-02 14:15 | Read:188 | Comments:0 | Tags:Data Protection Risk Management Cybersecurity Cybersecurity

Back to Filing Cabinets? Simplifying the Complex Task of Data Security

Data drives our businesses, economy and daily lives, so it comes as no surprise that data security needs to be a priority. But do we know what data we really have, where sensitive information is being collected and stored, what is happening with the data and where it is ultimately going? How do we build security around critical assets that we need to protect
Publish At:2017-09-29 11:50 | Read:173 | Comments:0 | Tags:Data Protection Data Classification Data Privacy Data Securi

Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges

Every chief information security officer (CISO) faces ongoing threats to his or her company’s assets. While some threats apply to every industry, IT security specialists in the health care, financial services, and energy and utilities sectors need to pay more attention to industry-specific security risks. Although these threats are most prevalent in th
Publish At:2017-09-26 09:56 | Read:140 | Comments:0 | Tags:Banking & Financial Services CISO Energy & Utility Health Ca

Data Activity Monitoring Gives Health Care Organizations X-Ray Vision Into Medical Imaging Security Risks

In health care, cyberthreats pose a substantial risk to patient safety, systems of care and business continuity. The security of electronic medical information has a tremendous impact on data access, which directly affects quality of care, patients’ rights to privacy and the professional standing of health care organizations. Practitioners can only mak
Publish At:2017-09-25 15:30 | Read:171 | Comments:0 | Tags:Data Protection Health Care Electronic Medical Records (EMRs

The Cloud Security Risks Hidden in Plain Sight

There are two popular attitudes about cloud security, and both of them are wrong. One belief is that putting data in the cloud amounts to putting it on the public internet for anyone to access. Therefore, the only way to keep data safe is to keep it at home and out of the cloud altogether. The opposite belief is that cloud providers cover their own bases wel
Publish At:2017-09-22 13:40 | Read:242 | Comments:0 | Tags:Cloud Security Risk Management Access Management Cloud Cloud

Leaking Cloud Databases and Servers Expose Over 1 Billion Records

As The Wall Street Journal recently pointed out, some clients of cloud service providers such as Amazon and Microsoft are accidentally leaving their cloud databases exposed due to misconfigurations of their services. Coupled with recent headline-making breaches, it’s becoming clear that the greatest risks to an organization might come down to a simple
Publish At:2017-09-21 19:15 | Read:208 | Comments:0 | Tags:Advanced Threats Cloud Security Data Protection Software & A

GDPR Readiness: From Mission Impossible to Mission Accomplished

Your mission, should you choose to accept it, involves the identification and protection of the Personal Data of residents in the European Union (EU). You may select key data security solutions to aid you. You have only eight months to complete this mission. Continue reading for specific steps to take. This message will self-destruct in 10 seconds. Sound int
Publish At:2017-09-20 06:25 | Read:158 | Comments:0 | Tags:Data Protection Data Security General Data Protection Regula

Increased Awareness Is the Best Cure for Health Care Security Risks

The health care market is quite heterogeneous, and as a result, each organization has a unique set of cybsersecurity needs and characteristics. The industry includes hospitals of all sizes, local doctoral consortia, public health care institutions and individual physicians. Naturally, health care security risks vary depending on the size and type of organiza
Publish At:2017-09-15 15:35 | Read:267 | Comments:0 | Tags:Data Protection Health Care Risk Management Chief Informatio

See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management

The art and science known as risk management has been around for years. It is applied in a broad array of areas, including insurance, credit risk ratings, stock and other market risk ratings, foreign policy decisions, military responses and many others. The true irony is that, although risk management has been applied to many aspects of IT, such as change ma
Publish At:2017-09-14 21:10 | Read:176 | Comments:0 | Tags:Data Protection Risk Management Data Breach Data Management

Think You Have Plenty of Time to Plan for GDPR? Think Again

We all do it. We look at a deadline that’s months away and we tell ourselves we’ve got lots of time to think about it. In fact, that’s probably what you thought when you first heard about the European Union (EU) General Data Protection Regulation (GDPR), which takes effect May 25, 2018. Even now, it’s still months away — right? So w
Publish At:2017-09-12 13:50 | Read:229 | Comments:0 | Tags:Banking & Financial Services Data Protection Compliance Data

The CISO’s Guide to Managing Insider Threats

Critical digital and physical assets are becoming increasingly vulnerable due to accelerated connectivity, differing global regulatory requirements, joint ventures and business partnerships and security weaknesses within complex multinational supply chains. These factors have led to a rise in insider threats for enterprises across all industries. An insider
Publish At:2017-09-11 19:25 | Read:216 | Comments:0 | Tags:CISO Data Protection Identity & Access Chief Information Sec

e-Signature Security Speeds Government Paperwork Along

As public administrators have learned, efficiency in government is largely a matter of executing the small things well. A saved mailing expense or avoided delay can add up to a lot more work for a lot less tax money, which is one practical definition of good government in action. One example of this process is a current U.S. Census Bureau initiative to imple
Publish At:2017-09-11 19:25 | Read:197 | Comments:0 | Tags:Data Protection Fraud Protection Government Authentication D

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud