HackDig : Dig high-quality web security articles for hacker

Worried About Apache Struts? Stay One Step Ahead of Endpoint Attacks

Endpoint attacks can come from any direction and many sources. Just consider the reported vulnerabilities found in Apache Struts and the damage caused by WannaCry and Petya. Companies need to stay one step ahead of endpoint attacks, but they struggle due to a lack of visibility of endpoint status, the complexity of investigations and ineffective remediation.
Publish At:2017-09-25 15:30 | Read:5054 | Comments:0 | Tags:Endpoint Incident Response Apache Endpoint Management Endpoi

The Time for IT Asset Management Is Now

The benefits of a comprehensive IT asset management (ITAM) program may seem obvious since it provides the data needed to strategically and tactically manage the life cycle of IT assets from purchase to end of life. Of course, companies can leverage IT asset management to reduce costs, improve operational efficiency, determine the full cost of existing invest
Publish At:2017-09-05 09:35 | Read:4419 | Comments:0 | Tags:Data Protection Asset Management Compliance Data Security En

Health Care Endpoint Hygiene: A Post-WannaCry Call to Action

More so than in any other industry, the recent WannaCry attack caused health care organizations to rethink processes for keeping systems current and secure. Although Microsoft patched the very vulnerabilities WannaCry exploited over three months ago, many organizations are still struggling to find and patch relevant computers and systems. The Hidden Complexi
Publish At:2017-06-22 11:35 | Read:3211 | Comments:0 | Tags:Endpoint Health Care Advanced Malware Endpoint Management En

More Mobile Apps Means More Man-in-the-Middle Attacks

When you travel outside your corporate network with your mobile device, you are much more vulnerable to man-in-the-middle (MitM) attacks. This is how attackers intercept data as it’s being passed from a mobile device to a server. Of course, this is problematic for a number of reasons. CSO Online demonstrated how easy it is to steal all sorts of informa
Publish At:2017-06-21 17:10 | Read:3415 | Comments:0 | Tags:Endpoint Mobile Security Application Security Bring-Your-Own

MaaS360: A GDPR-Ready Unified Endpoint Management Solution

From a compliance perspective, the General Data Protection Regulation (GDPR) is a key focus area in global enterprises. This regulation was first introduced in January 2012 and will go live on May 25, 2018. Refined by input from the European Council, European Parliament and European Commission, the GDPR, unlike a directive, will be directly applicable in all
Publish At:2017-05-19 10:05 | Read:4532 | Comments:0 | Tags:Data Protection Mobile Security Compliance Endpoint Manageme

Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security

There’s a famous quote that goes something like this: “Unapplied knowledge never benefited anyone.” I remember learning that back in college when working on a group project for a professor I’d had the previous semester. I earned a strong A in his class the first term, but the project we turned in the second time around didn’t g
Publish At:2017-05-19 10:05 | Read:3874 | Comments:0 | Tags:Endpoint Security Intelligence & Analytics Endpoint Manageme

How Basic Endpoint Patching Helps Protect Against Ransomware and Other Attacks

On Friday, a group of unknown threat actors carried out one of the largest cyberattacks of its kind, which infected hundreds of thousands of computers in 150 countries. The ransomware, known as WannaCry, exploits a Microsoft Windows OS vulnerability that was patched in Microsoft’s Security Bulletin two months ago. The universal advice was straightforwa
Publish At:2017-05-18 15:40 | Read:4985 | Comments:0 | Tags:Endpoint Endpoint Management Endpoint Protection IBM BigFix

The Road to 2020, Part III: Transforming Your Enterprise With Cognitive UEM

This is the final installment in a three-part series. Be sure to read part 1 for the more information on unified endpoint management (UEM) and part 2 for additional details surrounding the Internet of Things (IoT). Whether you read about it in a news article, saw it on a TV commercial or demoed it at a technology conference, you’ve probably had at leas
Publish At:2017-05-18 15:40 | Read:4372 | Comments:0 | Tags:Cognitive Mobile Security Artificial Intelligence (AI) Cogni

Vulnerability Management in the Age of Analytics

It is becoming increasingly critical to manage both unknown and known vulnerabilities. In fact, since even novice cybercriminals can exploit publicly disclosed issues, it may be even more important to manage known vulnerabilities. Furthermore, fraudsters can examine information associated with known threats to develop new attacks and scout potential targets
Publish At:2017-05-14 01:10 | Read:3472 | Comments:0 | Tags:Endpoint Security Intelligence & Analytics Endpoint Manageme

The Road to 2020, Part II: Transforming Your Enterprise With IoT

This is the second installment in a three-part series. Be sure to read part 1 for the more information on unified endpoint management. In the first installment of this series, we traversed each component of the unified endpoint management (UEM) hierarchy of needs, which consists of devices and things at its foundation, apps and content at the next level, fo
Publish At:2017-05-14 01:10 | Read:4050 | Comments:0 | Tags:Endpoint Mobile Security Endpoint Management Endpoint Protec

The Road to 2020, Part I: Transforming Your Enterprise With UEM

We live in interesting times. With everyone being so well-connected, it’s hard to believe they’re not actually attached at the hip to their smartphones to stay up to date in their personal and work lives. With so many different possible mechanisms to keep in touch, modern workers expect immediate, intuitive access to all applications, content and
Publish At:2017-05-05 01:55 | Read:4956 | Comments:0 | Tags:Mobile Security Endpoint Endpoint Management Endpoint Protec

UEM’s Most Wanted: Deliver Remote Support to Any Endpoint From Anywhere

For organizations of all types and sizes, boundless mobile connectivity and resource access have become more than just an efficiency game changer — they have become the norm. Banks and credit unions are putting shared devices at the center of transactions, maximizing branch employee utilization while cutting procurement costs. Similarly, energy and utilitie
Publish At:2017-04-20 03:30 | Read:4154 | Comments:0 | Tags:Mobile Security Network & Endpoint Endpoint Endpoint Managem

Taking a Cognitive Approach to Unified Endpoint Management

If you function like most IT organizations, you’ve spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you’ll find little difference bet
Publish At:2017-03-20 15:15 | Read:4149 | Comments:0 | Tags:Cognitive Mobile Security Network & Endpoint Cognitive Compu

Securing Devices, Data and Users: Unified Endpoint Management at IBM InterConnect 2015

Why You Need Unified Endpoint Management Technological advances are moving at a breakneck speed. What is even more astounding is the rate at which users are adopting these new technologies. Unlike previous generations of users, today’s generation is willing to adopt new technology before it goes to market — or, in some cases, is even developed — by bac
Publish At:2015-02-06 11:25 | Read:3224 | Comments:0 | Tags:Mobile Security Network & Endpoint Compliance Cybersecurity


Share high-quality web security related articles with you:)


Tag Cloud