HackDig : Dig high-quality web security articles for hacker

Execute Your IoT Deployment by the Book

Organizations contemplating Internet of Things (IoT) deployment projects must look at both past and future challenges through the lens of security. Enterprise data security is not a new topic, but for many companies, IoT deployments present new challenges because they extend the perimeter by introducing thousands of additional endpoints, each of which repres
Publish At:2017-06-27 20:30 | Read:2216 | Comments:0 | Tags:Endpoint Mobile Security Network Connected Devices Endpoint

Health Care Endpoint Hygiene: A Post-WannaCry Call to Action

More so than in any other industry, the recent WannaCry attack caused health care organizations to rethink processes for keeping systems current and secure. Although Microsoft patched the very vulnerabilities WannaCry exploited over three months ago, many organizations are still struggling to find and patch relevant computers and systems. The Hidden Complexi
Publish At:2017-06-22 11:35 | Read:2434 | Comments:0 | Tags:Endpoint Health Care Advanced Malware Endpoint Management En

More Mobile Apps Means More Man-in-the-Middle Attacks

When you travel outside your corporate network with your mobile device, you are much more vulnerable to man-in-the-middle (MitM) attacks. This is how attackers intercept data as it’s being passed from a mobile device to a server. Of course, this is problematic for a number of reasons. CSO Online demonstrated how easy it is to steal all sorts of informa
Publish At:2017-06-21 17:10 | Read:2749 | Comments:0 | Tags:Endpoint Mobile Security Application Security Bring-Your-Own

Securing Your Enterprise Assets While Traveling for Work

Traveling for work is a regular occurrence for many of us. Most of the time, traveling for client meetings, conferences, team meetings and other work-related activities also means taking a laptop or other portable devices traveling too. These devices could easily include your company’s IP, strategic plans, financials or other sensitive enterprise asset
Publish At:2017-06-08 16:05 | Read:2748 | Comments:0 | Tags:Data Protection Endpoint Mobile Security Security Intelligen

Four Key Considerations for Managing Your IoT Population

As your Internet of Things (IoT) device population grows, managing it becomes increasingly difficult. More devices means more potentially vulnerable endpoints, more identities to verify and more software to keep up to date. Four Keys to Effective IoT Population Management To effectively manage your IoT population, it’s important to know your users, d
Publish At:2017-06-05 14:15 | Read:2815 | Comments:0 | Tags:Endpoint Mobile Security Network Authentication Chief Inform

Our Bring Your Own Malware Challenge is Back!

We are hosting the Bring Your Own Malware Challenge at a series of upcoming events. Bring it to InfoSec in London, Gartner Security Summit in Maryland and of course, Black Hat in July. The rules are simple, you have to plan ahead, but we have a cash prize. That’s right. We’ll be hosting our BYOM aka Bring Your Own Malware Challenge once again, and it will
Publish At:2017-05-25 01:00 | Read:3938 | Comments:0 | Tags:Company News Threats challenge endpoint infosec Isolation Ma

Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security

There’s a famous quote that goes something like this: “Unapplied knowledge never benefited anyone.” I remember learning that back in college when working on a group project for a professor I’d had the previous semester. I earned a strong A in his class the first term, but the project we turned in the second time around didn’t g
Publish At:2017-05-19 10:05 | Read:3293 | Comments:0 | Tags:Endpoint Security Intelligence & Analytics Endpoint Manageme

How Basic Endpoint Patching Helps Protect Against Ransomware and Other Attacks

On Friday, a group of unknown threat actors carried out one of the largest cyberattacks of its kind, which infected hundreds of thousands of computers in 150 countries. The ransomware, known as WannaCry, exploits a Microsoft Windows OS vulnerability that was patched in Microsoft’s Security Bulletin two months ago. The universal advice was straightforwa
Publish At:2017-05-18 15:40 | Read:4181 | Comments:0 | Tags:Endpoint Endpoint Management Endpoint Protection IBM BigFix

The Road to 2020, Part III: Transforming Your Enterprise With Cognitive UEM

This is the final installment in a three-part series. Be sure to read part 1 for the more information on unified endpoint management (UEM) and part 2 for additional details surrounding the Internet of Things (IoT). Whether you read about it in a news article, saw it on a TV commercial or demoed it at a technology conference, you’ve probably had at leas
Publish At:2017-05-18 15:40 | Read:3455 | Comments:0 | Tags:Cognitive Mobile Security Artificial Intelligence (AI) Cogni

Lessons Learned From the WannaCry Ransomware Attack and Many Others That Preceded It

Dry Your Eyes: Lessons Learned From WannaCry If you’re reading this post, congratulations! You hopefully aren’t using one of the more than 200,000 computers that were hit by the first wave of the WannaCry ransomware attack. Those unfortunate victims are dealing with bigger problems right now, such as how to admit patients to their emergency rooms
Publish At:2017-05-17 21:15 | Read:3210 | Comments:0 | Tags:Endpoint Incident Response Malware Security Intelligence & A

The Looming Threat of Health Care IoT Devices

A computer generation or two ago, IT managers fought a futile uphill battle to prevent rogue PCs from infiltrating the workplace, a battle fought largely in the name of data security. Their thinking was that if IT couldn’t manage it, they couldn’t secure it. Is history repeating itself with health care IoT devices? Fast forward to the present h
Publish At:2017-05-15 14:00 | Read:4305 | Comments:0 | Tags:Endpoint Health Care Network Connected Devices Health Care D

Vulnerability Management in the Age of Analytics

It is becoming increasingly critical to manage both unknown and known vulnerabilities. In fact, since even novice cybercriminals can exploit publicly disclosed issues, it may be even more important to manage known vulnerabilities. Furthermore, fraudsters can examine information associated with known threats to develop new attacks and scout potential targets
Publish At:2017-05-14 01:10 | Read:2680 | Comments:0 | Tags:Endpoint Security Intelligence & Analytics Endpoint Manageme

The Hidden Privacy Issues With Windows 10: The Injection of Ads and How to Improve Your Online Privacy

Microsoft’s Windows 10 is rapidly replacing older operating systems in both personal and professional environments. As with any OS, however, there are several key things you need to know upfront. The addition of unique advertising IDs that inject Microsoft ads into your browser, recommended express privacy settings and cloud syncing of personal inform
Publish At:2017-05-14 01:10 | Read:1958 | Comments:0 | Tags:Endpoint Identity & Access advertising opt-out page cortana

The Road to 2020, Part II: Transforming Your Enterprise With IoT

This is the second installment in a three-part series. Be sure to read part 1 for the more information on unified endpoint management. In the first installment of this series, we traversed each component of the unified endpoint management (UEM) hierarchy of needs, which consists of devices and things at its foundation, apps and content at the next level, fo
Publish At:2017-05-14 01:10 | Read:3185 | Comments:0 | Tags:Endpoint Mobile Security Endpoint Management Endpoint Protec

WannaCry Ransomware Racing Around the World, Wreaking Havoc

This is a special rapid response blog to breaking news about the WannaCry ransomware attack that is now being seen in more than 100 countries. We’ll be updating our blog with additional news as we learn more.  “No x-rays/bloods/bleeps/phones/notes. This is unprecedented. It will be a miracle if no-one comes to harm.” This dramatic tweet from an Nationa
Publish At:2017-05-13 12:35 | Read:2978 | Comments:0 | Tags:Breaking News Threats breach breaking news endpoint microsof

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud