HackDig : Dig high-quality web security articles for hacker

Personal Electronic Devices Dodge TSA Ban — For Now

At least for the time being, business travelers will still be able to take their laptops and tablets along as carry-on luggage when they board a flight. That is the decision by the Transportation Safety Administration (TSA), which lifted its ban on air passengers carrying aboard personal electronic devices larger than a smartphone earlier this summer. The
Publish At:2017-08-25 11:15 | Read:224 | Comments:0 | Tags:Mobile Security Endpoint Security Mobile Devices Transportat

Best Practices for Developing and Securing a Microservices Architecture

Co-authored by Chris Craig. To match the ongoing shift to cloud as a means of increasing agility when delivering services, the architectures supporting these services are also evolving. The cloud IT space is full of terminology such as infrastructure-as-code, highly scalable architectures and microservices architecture — a methodology that is gathering sig
Publish At:2017-08-15 11:45 | Read:203 | Comments:0 | Tags:Cloud Security Cloud Cloud Adoption Cloud Computing Cloud Se

Threat Hunting Services Are Now a Basic Necessity

For the past few years, the security industry has seen a gradual move away from traditional, resource-heavy endpoint protection agents to next-generation solutions in response to the increasing sophistication of malware, cybercriminal tactics and the threat landscape at large. Traditional host intrusion detection systems (HIDS) built on signature-based det
Publish At:2017-08-07 21:55 | Read:233 | Comments:0 | Tags:Endpoint Security Intelligence & Analytics Security Services

Responsive Machine Learning: The Necessary Evolution of Endpoint Security

Machine learning is changing the way industries address critical challenges by using the combined power of automation, cloud-based scalability and specialized programming to surface unexpected relationships and insights. With thousands of new malicious programs emerging every day, security solutions that integrate responsive machine learning can identify an
Publish At:2017-07-18 13:40 | Read:271 | Comments:0 | Tags:Cognitive Endpoint Cognitive Computing Cognitive Security En

Execute Your IoT Deployment by the Book

Organizations contemplating Internet of Things (IoT) deployment projects must look at both past and future challenges through the lens of security. Enterprise data security is not a new topic, but for many companies, IoT deployments present new challenges because they extend the perimeter by introducing thousands of additional endpoints, each of which repres
Publish At:2017-06-27 20:30 | Read:371 | Comments:0 | Tags:Endpoint Mobile Security Network Connected Devices Endpoint

Health Care Endpoint Hygiene: A Post-WannaCry Call to Action

More so than in any other industry, the recent WannaCry attack caused health care organizations to rethink processes for keeping systems current and secure. Although Microsoft patched the very vulnerabilities WannaCry exploited over three months ago, many organizations are still struggling to find and patch relevant computers and systems. The Hidden Complexi
Publish At:2017-06-22 11:35 | Read:294 | Comments:0 | Tags:Endpoint Health Care Advanced Malware Endpoint Management En

Securing Your Enterprise Assets While Traveling for Work

Traveling for work is a regular occurrence for many of us. Most of the time, traveling for client meetings, conferences, team meetings and other work-related activities also means taking a laptop or other portable devices traveling too. These devices could easily include your company’s IP, strategic plans, financials or other sensitive enterprise asset
Publish At:2017-06-08 16:05 | Read:478 | Comments:0 | Tags:Data Protection Endpoint Mobile Security Security Intelligen

Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security

There’s a famous quote that goes something like this: “Unapplied knowledge never benefited anyone.” I remember learning that back in college when working on a group project for a professor I’d had the previous semester. I earned a strong A in his class the first term, but the project we turned in the second time around didn’t g
Publish At:2017-05-19 10:05 | Read:516 | Comments:0 | Tags:Endpoint Security Intelligence & Analytics Endpoint Manageme

Vulnerability Management in the Age of Analytics

It is becoming increasingly critical to manage both unknown and known vulnerabilities. In fact, since even novice cybercriminals can exploit publicly disclosed issues, it may be even more important to manage known vulnerabilities. Furthermore, fraudsters can examine information associated with known threats to develop new attacks and scout potential targets
Publish At:2017-05-14 01:10 | Read:402 | Comments:0 | Tags:Endpoint Security Intelligence & Analytics Endpoint Manageme

The Road to 2020, Part II: Transforming Your Enterprise With IoT

This is the second installment in a three-part series. Be sure to read part 1 for the more information on unified endpoint management. In the first installment of this series, we traversed each component of the unified endpoint management (UEM) hierarchy of needs, which consists of devices and things at its foundation, apps and content at the next level, fo
Publish At:2017-05-14 01:10 | Read:562 | Comments:0 | Tags:Endpoint Mobile Security Endpoint Management Endpoint Protec

The Road to 2020, Part I: Transforming Your Enterprise With UEM

We live in interesting times. With everyone being so well-connected, it’s hard to believe they’re not actually attached at the hip to their smartphones to stay up to date in their personal and work lives. With so many different possible mechanisms to keep in touch, modern workers expect immediate, intuitive access to all applications, content and
Publish At:2017-05-05 01:55 | Read:643 | Comments:0 | Tags:Mobile Security Endpoint Endpoint Management Endpoint Protec

UEM’s Most Wanted: Deliver Remote Support to Any Endpoint From Anywhere

For organizations of all types and sizes, boundless mobile connectivity and resource access have become more than just an efficiency game changer — they have become the norm. Banks and credit unions are putting shared devices at the center of transactions, maximizing branch employee utilization while cutting procurement costs. Similarly, energy and utilitie
Publish At:2017-04-20 03:30 | Read:637 | Comments:0 | Tags:Mobile Security Network & Endpoint Endpoint Endpoint Managem

Taking a Cognitive Approach to Unified Endpoint Management

If you function like most IT organizations, you’ve spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you’ll find little difference bet
Publish At:2017-03-20 15:15 | Read:696 | Comments:0 | Tags:Cognitive Mobile Security Network & Endpoint Cognitive Compu

It’s Time to Go Beyond Next-Generation Endpoint Security

Endpoints are at the center of the universe of advanced attacks. They’re the most vulnerable, and act as a favored attack vector for cybercriminals because they provide the easiest entry points into your network. If you work in IT, you know how vulnerable endpoints can be and understand the need for a continuous approach to securing them, both proactiv
Publish At:2017-02-13 15:10 | Read:799 | Comments:0 | Tags:Cognitive Network & Endpoint Security Intelligence & Analyti

Is it Time to Buy Cyber Insurance?

It may be time to buy cyber insurance for your business. There are a lot of choices and ways to go about doing this, and all firms start out at the same place — offering reimbursement in case you suffer a data or financial loss. But they end up in different places: Some vendors have insurance policy add-ons to your traditional business liability insurance, w
Publish At:2017-02-06 17:05 | Read:650 | Comments:0 | Tags:Data Protection Data Breach Data Security Endpoint Endpoint

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud