HackDig : Dig high-quality web security articles for hacker

The Current State of IT Resilience

IT resilience refers to a network or system’s ability to withstand the slings and arrows of life and operations, from human error to migration failure to natural disaster. Any of these unavoidable factors can disrupt or even cripple an enterprise. As a concept, IT resilience is closely related to security. A deliberate attack is, in a sense, a predicta
Publish At:2017-01-27 17:35 | Read:933 | Comments:0 | Tags:Risk Management Business Continuity Cloud Cloud Computing Cl

2017 security predictions

From W-2 scams to WordPress vulnerabilities, ransomware, business email compromises, DDos attacks and allegations of a hacked presidential election -- 2016's been a hell of a year in cybersecurity, and it's not over yet.There's no reason to believe 2017 will be any better. If anything, it could be even worse as cybercriminals continue to push social eng
Publish At:2016-11-30 11:15 | Read:1017 | Comments:0 | Tags:Hiring Security Hacking Cyberterrorism Disaster Recovery

Companies complacent about data breach preparedness

The likelihood that companies will experience a security incident continue to rise every year. While most organizations have put a data breach preparedness plan in place to combat such incidents, most executives aren't updating or practicing the plan regularly, according to study released earlier this month."When it comes to managing a data breach, havin
Publish At:2016-10-28 18:25 | Read:1014 | Comments:0 | Tags:Security Disaster Recovery Backup and Recovery IT Strategy

Taking down the internet: possible but how probable?

The hack of the Democratic National Committee this past summer, allegedly by Russia, prompted a political firestorm, but didn’t cause even a ripple in the US economy.But imagine the economic firestorm that would result if online attackers brought the entire internet down, even temporarily.You may not have to imagine it, according to Bruce Schneier, CTO o
Publish At:2016-10-06 07:25 | Read:864 | Comments:0 | Tags:Security Disaster Recovery Internet Cybersecurity

Gartner: How to make a digital risk plan and sell it to the board

It’s not enough for security pros to figure out how to protect digital enterprises from risks that can ruin the business, they must effectively sell it to corporate boards whose blessing is needed to authorize the plan, Gartner analysts told attendees at their Security and Risk Management Summit.With that in mind, three Gartner security specialists walke
Publish At:2016-06-14 20:00 | Read:891 | Comments:0 | Tags:Security Leadership and Management Disaster Recovery Backup

Business Continuity Management: Crisis Leadership

High-profile events such as data breaches, natural disasters and terrorist attacks are raising enterprise awareness of business continuity management (BCM). Leaders have a crucial stake in ensuring the continuity and resiliency of business operations in the face of interruptions. Unfortunately, many organizations still have not put into place the people, pro
Publish At:2016-01-25 17:05 | Read:1197 | Comments:0 | Tags:CISO Data Protection Risk Management Business Continuity Com

Malware Served via Anti-Adblocking Service PageFair

Hackers breached the systems of anti-adblocking solutions provider PageFair and used the access to deliver malware via the publishers that rely on the company’s services.PageFair helps web publishers measure and recover revenue lost due to ad blockers, which have become increasingly problematic for the advertising industry. The company says it serves more th
Publish At:2015-11-03 15:55 | Read:981 | Comments:0 | Tags:Cyberwarfare Desktop Security Disaster Recovery Mobile Secur

The InfoSecond, Oct. 12–16: Disaster Fraud, Attack Scenarios and More!

Disasters, SOCs, Attacks, and Dyre straits… it’s time for an all-new InfoSecond! In our latest entry, we touch on criminals capitalizing on disasters – and who they’re targeting, the three questions you should ask before setting up a Security Operations Center (SOC), connecting the data on attack scenarios using the latest findings, and how
Publish At:2015-10-20 15:15 | Read:654 | Comments:0 | Tags:Fraud Protection Disaster Recovery Dyre Trojan Fraud Fraud P

Sony Asks Media Groups to Delete 'Stolen' Data

Sony Pictures Entertainment pressed media outlets Sunday against using data hackers may have leaked about the studio. In the letter sent to groups including The New York Times and The Hollywood Reporter, lawyer David Boies said the "stolen information" must be destroyed and should not make it to publication. The studio "does not consent to your posse
Publish At:2014-12-15 19:40 | Read:1149 | Comments:0 | Tags:Disaster Recovery NEWS & INDUSTRY Incident Management Tr

Sony Meeting After Hackers Vow 'Christmas Gift'

Sony Pictures organized a town hall-style meeting with staff Monday to discuss the massive cyber attack on the Hollywood studio, a day after hackers promised a big "Christmas gift." Staff were called together at its headquarters west of Los Angeles to hear how the company is responding to the ongoing hacking attack which has produced a string of dama
Publish At:2014-12-15 19:40 | Read:1242 | Comments:0 | Tags:Disaster Recovery NEWS & INDUSTRY Incident Management Cy

How CISOs Can Ensure Business Survivability

These days, the battle for system-wide survivability can be found in many places, from the army to scientific laboratories to building fields for ships and airplanes. A security system should be considered survivable when it provides a permanent service level despite unstable business factors or changes to its structure and behavior. For instance, let’
Publish At:2014-10-01 02:20 | Read:1001 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) Cybersecurity

Popular Android apps fail basic security tests, putting privacy at risk

Instagram, Grindr, OkCupid and many other Android applications fail to take basic precautions to protect their users’ data, putting their privacy at risk, according to new study.The findings comes from the University of New Haven’s Cyber Forensics Research and Education Group (UNHcFREG), which earlier this year found vulnerabilities in the messaging applicat
Publish At:2014-09-08 23:30 | Read:1304 | Comments:0 | Tags:Disaster Recovery Data Center ERP Enterprise Software Securi

Windows Security Update Causing System Crash

A recent security bulletin released by Microsoft as part of the August 2014 Patch Tuesday can lead to a crash on some systems, the company said in a knowledge base article. Microsoft launched an investigation after a large number of users reported getting a so-called "blue screen of death" (BSOD) after installing update KB2982791 (MS14-045). MS1
Publish At:2014-08-18 11:40 | Read:1181 | Comments:0 | Tags:Disaster Recovery NEWS & INDUSTRY Incident Management Vu

CSO : Common Sense Operator/Operations

As the CSO/CISO/person responsible for Information Security, your job is to…  well … do you even know?  Does upper management know?  "Our crappy CSO <this>…" and "Our stupid CSO <that>…" are statements commonly used by various (techie) people, throw
Publish At:2014-08-10 15:20 | Read:1624 | Comments:0 | Tags:CSO 178-79-152-9 attitude bcp business continiuty ciso commo


Share high-quality web security related articles with you:)


Tag Cloud