HackDig : Dig high-quality web security articles for hacker

A Cybersecurity Proof: The Application is the Endpoint

Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to rethink information security defense around fewer, smarter, yet more effective layers You have many more endpoints than you think. How m
Publish At:2017-10-21 16:25 | Read:2439 | Comments:0 | Tags:Threats access points application attack vector endpoint End

Worried About Apache Struts? Stay One Step Ahead of Endpoint Attacks

Endpoint attacks can come from any direction and many sources. Just consider the reported vulnerabilities found in Apache Struts and the damage caused by WannaCry and Petya. Companies need to stay one step ahead of endpoint attacks, but they struggle due to a lack of visibility of endpoint status, the complexity of investigations and ineffective remediation.
Publish At:2017-09-25 15:30 | Read:3711 | Comments:0 | Tags:Endpoint Incident Response Apache Endpoint Management Endpoi

The Time for IT Asset Management Is Now

The benefits of a comprehensive IT asset management (ITAM) program may seem obvious since it provides the data needed to strategically and tactically manage the life cycle of IT assets from purchase to end of life. Of course, companies can leverage IT asset management to reduce costs, improve operational efficiency, determine the full cost of existing invest
Publish At:2017-09-05 09:35 | Read:3504 | Comments:0 | Tags:Data Protection Asset Management Compliance Data Security En

Threat Hunting Services Are Now a Basic Necessity

For the past few years, the security industry has seen a gradual move away from traditional, resource-heavy endpoint protection agents to next-generation solutions in response to the increasing sophistication of malware, cybercriminal tactics and the threat landscape at large. Traditional host intrusion detection systems (HIDS) built on signature-based det
Publish At:2017-08-07 21:55 | Read:3034 | Comments:0 | Tags:Endpoint Security Intelligence & Analytics Security Services

Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security

There’s a famous quote that goes something like this: “Unapplied knowledge never benefited anyone.” I remember learning that back in college when working on a group project for a professor I’d had the previous semester. I earned a strong A in his class the first term, but the project we turned in the second time around didn’t g
Publish At:2017-05-19 10:05 | Read:3113 | Comments:0 | Tags:Endpoint Security Intelligence & Analytics Endpoint Manageme

How Basic Endpoint Patching Helps Protect Against Ransomware and Other Attacks

On Friday, a group of unknown threat actors carried out one of the largest cyberattacks of its kind, which infected hundreds of thousands of computers in 150 countries. The ransomware, known as WannaCry, exploits a Microsoft Windows OS vulnerability that was patched in Microsoft’s Security Bulletin two months ago. The universal advice was straightforwa
Publish At:2017-05-18 15:40 | Read:3846 | Comments:0 | Tags:Endpoint Endpoint Management Endpoint Protection IBM BigFix

Vulnerability Management in the Age of Analytics

It is becoming increasingly critical to manage both unknown and known vulnerabilities. In fact, since even novice cybercriminals can exploit publicly disclosed issues, it may be even more important to manage known vulnerabilities. Furthermore, fraudsters can examine information associated with known threats to develop new attacks and scout potential targets
Publish At:2017-05-14 01:10 | Read:2419 | Comments:0 | Tags:Endpoint Security Intelligence & Analytics Endpoint Manageme

Compliance Does Not Always Cure Health Care Security Woes

For organizations in highly regulated sectors such as health care, compliance with regulatory standards is not just a good idea; it’s the law. Moreover, there is a broad consensus that the regulatory standards are soundly based on security principles. Complaints about excessive or misguided regulations are not often heard. But the flip side of this r
Publish At:2017-05-14 01:10 | Read:2283 | Comments:0 | Tags:Data Protection Health Care Compliance Data Privacy Endpoint

The Road to 2020, Part II: Transforming Your Enterprise With IoT

This is the second installment in a three-part series. Be sure to read part 1 for the more information on unified endpoint management. In the first installment of this series, we traversed each component of the unified endpoint management (UEM) hierarchy of needs, which consists of devices and things at its foundation, apps and content at the next level, fo
Publish At:2017-05-14 01:10 | Read:2888 | Comments:0 | Tags:Endpoint Mobile Security Endpoint Management Endpoint Protec

The Road to 2020, Part I: Transforming Your Enterprise With UEM

We live in interesting times. With everyone being so well-connected, it’s hard to believe they’re not actually attached at the hip to their smartphones to stay up to date in their personal and work lives. With so many different possible mechanisms to keep in touch, modern workers expect immediate, intuitive access to all applications, content and
Publish At:2017-05-05 01:55 | Read:3538 | Comments:0 | Tags:Mobile Security Endpoint Endpoint Management Endpoint Protec

Why Bromium Is Not Just Protection, But Also An Enhanced Predictive Analytics Solution

Zero-day attacks exploit vulnerabilities or security holes in software. In the event of a malicious attack on any microVM, malware payloads cannot infiltrate the enterprise network. LAVA provides highly specific details about every malicious breach, identifying external IP addresses, memory exploits, a list of affected files, and covert attempts to connect
Publish At:2017-04-16 13:05 | Read:2775 | Comments:0 | Tags:Innovation Data Analytics Endpoint Protection Forensics Virt

Bromium, the Stuff Super Heroes Use

For any of you who were at one time in your youth a Super Hero, technology today might be a little reminiscent of that time. Unlike those childhood games, however, this is no game at all. In the world of technology the enemy engages us with weapons like phishing and malware. What is this new super-powered defense? It is called Bromium, not just protection b
Publish At:2017-04-16 13:05 | Read:2198 | Comments:0 | Tags:End Users end user Endpoint Protection Security threat

Taking a Cognitive Approach to Unified Endpoint Management

If you function like most IT organizations, you’ve spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you’ll find little difference bet
Publish At:2017-03-20 15:15 | Read:3211 | Comments:0 | Tags:Cognitive Mobile Security Network & Endpoint Cognitive Compu

The Enterprise Mobility Conundrum: How to Control the Data?

What’s not to like about a good bring-your-own-device (BYOD) policy? For most companies, BYOD is a great deal. Employees buy and maintain the devices, and the company gets the benefit of their off-hours availability and productivity while traveling. Nearly three-quarters of organizations with enterprise mobility initiatives have adopted a plan to estab
Publish At:2017-03-13 17:00 | Read:2246 | Comments:0 | Tags:Mobile Security Network & Endpoint Bring-Your-Own-Device (BY

The OPM Breach and Why You Should Fire Your Cyber Janitor

In June of 2015 the United States Office of Personnel Management (OPM) announced they had been the target of what became one of the largest breaches of government data in history. When the dust settled, it was determined that over 20 million people were affected. The data stolen from individuals was Social Security numbers, names, addresses, relatives, and
Publish At:2017-03-11 18:40 | Read:2552 | Comments:0 | Tags:Threats Endpoint Protection Federal Malware Zero Day

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud