HackDig : Dig high-quality web security articles for hackers

Loving the Algorithm: User Risk Management and Good Security Hygiene

User risk management watches where people can’t. If you polled a random sampling of employees at various organizations, most would probably consider themselves security-minded. They would argue that they are not actively sending sensitive data to malicious recipients, clicking strange links or downloading attachments from unknown senders. This mindset
Publish At:2020-08-07 09:04 | Read:159 | Comments:0 | Tags:Endpoint Mobile Security Cloud Security Insider Threat Risk

Endpoint Security Using AI & MITRE For Your Remote Workforce

As employees increasingly work remotely, it is more important than ever to maintain visibility and threat detection in a remote working world. We have seen a significant increase in state-sponsored attacks and malicious phishing campaigns, and this trend is expected to continue. This period of remote work is a good time for enterprise to make sure endpoint
Publish At:2020-08-06 09:54 | Read:115 | Comments:0 | Tags:Endpoint remote workforce Endpoint Security Remote Access Th

Build a Roadmap for Cyber Resilience

The current information security landscape is rapidly evolving. According to the latest research from IBM Security and the Ponemon Institute’s 2020 Cyber Resilient Organization Report, 67% of organizations reported that the volume of attacks had significantly increased over the past 12 months. It’s not just the amount of attacks that grew; 64% o
Publish At:2020-08-03 08:33 | Read:128 | Comments:0 | Tags:CISO Data Protection Endpoint Advanced Attacks Advanced Thre

What Are Insider Threats and How Can You Mitigate Them?

What is an insider threat? Insider threats are users with legitimate access to company assets who use that access, whether maliciously or unintentionally, to cause harm to the business. Insider threats aren’t necessarily current employees, they can also be former employees, contractors or partners who have access to an organization’s systems or d
Publish At:2020-07-17 14:07 | Read:88 | Comments:0 | Tags:CISO Endpoint Identity & Access Access Management Cost of a

Why Zero-Click Cyberthreats Should Be on Your Radar

For years, the statistics have told us that human error is the greatest contributor to cyberattacks. We’ve stressed the importance of training, training and more training to prevent the almost inevitable from happening. We’ve been convinced that the key to defending against cyberthreats is to keep the unsuspecting from clicking on phishing emails
Publish At:2020-07-02 15:59 | Read:156 | Comments:0 | Tags:Application Security Endpoint Mobile Security Advanced Malwa

The Modern Workplace: Keeping Remote Workers Productive and Secure

Results from the March 30, 2020, Gartner CFO Survey indicate that 74% of businesses intend to shift some employees to permanent remote work following their initial experience responding to current global conditions. Regardless of recent world events, many workers already spend time on the job, while physically separated from the corporate campus. Sometimes t
Publish At:2020-06-30 13:48 | Read:157 | Comments:0 | Tags:Endpoint Mobile Security Risk Management BYOD Bring-Your-Own

Vulnerable Powerline Extenders Underline Lax IoT Security

Multiple vulnerabilities have been found in Tenda PA6 Wi-Fi Powerline extender, version 1.0.1.21. This device is part of Tenda’s PH5 Powerline Extender Kit and extends the wireless network through home’s existing electrical circuitry. The kit, in collaboration with X-Force Red, IBM Security’s team of hackers, aligns with the HomePlug AV2 technology and
Publish At:2020-06-25 14:07 | Read:193 | Comments:0 | Tags:Application Security Endpoint Software & App Vulnerabilities

An Apple a Day: Treating BYOD Pains with Apple User Enrollment

Even with workers returning to the office—it might be a trickle or a flood depending on the organization—the shift towards remote work is moving from just a short-term necessity to a long-term reality. That shift has changed the face of business worldwide. This change makes it more important than ever for IT and Security teams to prioritize endpoint manageme
Publish At:2020-06-24 11:06 | Read:229 | Comments:0 | Tags:Application Security Endpoint Mobile Security user enrollmen

Visibility and Threat Detection in a Remote Working World

At the outset of the COVID-19 pandemic, when governments around the world put stay-at-home orders in place, it was hard to imagine the state of work would permanently change. Yet, as organizations rapidly adopted and expanded systems to enable a remote workforce — which doubled in size in just three weeks — company cultures began shifting, too. As employees
Publish At:2020-06-24 11:06 | Read:193 | Comments:0 | Tags:CISO Endpoint Security Intelligence & Analytics Threat Hunti

Ginp Malware Operations are on the Rise, Aiming to Expand in Turkey

The Ginp mobile banking malware, which emerged in late 2019, is one of the top most prevalent Android banking malware families today. It started as a simple short message server (SMS) stealer and rapidly evolved into one of the most advanced actors in the financial fraud landscape. Ginp has primarily targeted Spanish banks, but recent evidence suggests the m
Publish At:2020-06-18 12:15 | Read:167 | Comments:0 | Tags:Application Security Banking & Financial Services Data Prote

The Latest Mobile Security Threats and How to Prevent Them

For many of us, the last few months have drastically increased our reliance on mobile capabilities. Through the increased use of corporate mobile apps, virtual private networks (VPNs), hot spots and more, mobile communications are more ubiquitous than ever. Because of this enhanced, unprecedented and sudden dependence on mobile capabilities, mobile security
Publish At:2020-06-15 10:53 | Read:291 | Comments:0 | Tags:Mobile Security Bring-Your-Own-Device (BYOD) Data Data Breac

SMBs Are Ready to Grow Into Enterprise Mobility Management (EMM) and Beyond

In the tech industry, “enterprise” is often equated to large businesses, but when it comes to enterprise mobility management (EMM), we should expand our definition. Why? Small and mid-size businesses (typically firms with 100-999 workers) today need the same mobile device, app and content management capabilities as the big guys. Many of these sma
Publish At:2020-05-24 06:18 | Read:211 | Comments:0 | Tags:Endpoint Mobile Security Connected Devices Endpoint Manageme

Android Enterprise Adds Flexibility But Still Calls for UEM Solutions

With the deployment of Android 10 on all new smartphones comes Android Enterprise, previously known as Android for Work. Even though it has its roots in Android 5.0 (Lollipop) launched in 2014, it is now a mandatory feature on all Android 10 devices when managed with an enterprise mobility management (EMM) solution. Android Enterprise’s Flexible Deploy
Publish At:2020-04-08 07:29 | Read:740 | Comments:0 | Tags:Endpoint Mobile Security Risk Management Android Android App

Extend Your Security Team, Quickly Add Expertise and Help Secure Your Remote Workforce

Organizations around the world are adapting to respond to the impact of the novel coronavirus (COVID-19). Companies may experience increased stress and challenges across their security programs arising from increased remote user demand, site availability impacts, stringent travel restrictions and requests for social distancing. Security organizations may als
Publish At:2020-03-23 14:33 | Read:417 | Comments:0 | Tags:Endpoint Risk Management Security Services Endpoint Protecti

Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

The traditional threat landscape comprised of conventional IT assets is difficult enough to protect, detect and respond to, but the landscape seems to be quickly expanding beyond traditional IT. Those new domains are operational technology (OT), the internet of things (IoT) and the internet of medical things (IoMT). Devices from non-traditional IT environmen
Publish At:2020-03-04 13:39 | Read:654 | Comments:0 | Tags:Endpoint Energy & Utility Healthcare Threat Intelligence NIS

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud