HackDig : Dig high-quality web security articles for hackers

The best test for an EDR solution is one that works for you

Since its inception, the endpoint detection and response (EDR) market has evolved rapidly with new innovations to better address the cyber landscape and meet customers’ needs for an effective and simple solution that just works. But finding something that just works means something quite different for every business, depending on their size, security expe
Publish At:2020-05-28 16:55 | Read:230 | Comments:0 | Tags:Awareness Explained Opinion Security world alert fatigue aut

Explained: cloud-delivered security

As a counterpart to security for your assets in the cloud, you may also run into solutions that offer security from the cloud. These solutions are generally referred to as cloud-delivered security. Cloud-delivered security is sometimes called security-as-a-service which we will avoid here as it might be confused with the more generally used term Software-as-
Publish At:2020-05-18 13:43 | Read:270 | Comments:0 | Tags:Explained cloud iaas identity management MSP paas saas small

Harnessing the power of identity management (IDaaS) in the cloud

Sometimes, consumers have it easy. Take, for example, when they accidentally lock themselves out of their personal email. Their solution? Reset the password. With one click, they’re able to change their old, complicated password with a new, more memorable one. Self-service password reset is awesome like this. For users on a business network, it&#
Publish At:2020-02-18 15:49 | Read:659 | Comments:0 | Tags:Explained hybrid environment iam IDaaS identity and access m

Explained: the strengths and weaknesses of the Zero Trust model

In a US court of law, the accused are deemed to be innocent until proven guilty. In a Zero Trust security model, the opposite is true. Everything and everyone must be considered suspect—questioned, investigated, and cross-checked—until we can be absolutely sure it is safe to be allowed. Zero Trust is a concept created by John Kindervag in 2010 during his
Publish At:2020-01-28 16:50 | Read:869 | Comments:0 | Tags:Explained byod cloud framework identity management insider t

Explained: data enrichment

How do your favorite brands know to use your first name in the subject line of their emails? Why do you seem to get discounts and special offers on products you’ve recently purchased? Businesses are able to personalize their marketing messages thanks to data enrichment. Data enrichment applies to the process of enhancing, refining, and improving on
Publish At:2020-01-16 16:50 | Read:700 | Comments:0 | Tags:Explained contact enrichment data cleaning data enrichment g

Explained: edge computing

Edge computing may seem like a foreign and future-facing term. Yet its applications are widespread and diverse, with the ability to transform the way we store, use, and share data and programs online. The implications of edge computing are far-reaching, trickling down from software development and business applications to everyday computing—even to gameplay.
Publish At:2019-12-30 16:50 | Read:938 | Comments:0 | Tags:Explained cdn cloud edge computing latency security

Explained: What is containerization?

Containerization. Another one of those tech buzzwords folks love to say but often have no idea what it means. A better way to organize children’s toys? The act of bringing tupperware out to dinner to safely transport home leftovers? Another name for Russian dolls? Containerization is, of course, none of those things. But its definition might be best
Publish At:2019-12-04 16:50 | Read:1051 | Comments:0 | Tags:Explained cloud containerization containers instances manage

Explained: juice jacking

When your battery is dying and you’re nowhere near a power outlet, would you connect your phone to any old USB port? Joyce did, and her mobile phone got infected. How? Through a type of cyberattack called “juice jacking.” Don’t be like Joyce. Although Joyce and her infected phone are hypothetical, juice jacking is technically possible.
Publish At:2019-11-21 16:50 | Read:1158 | Comments:0 | Tags:Explained charge adaptor data transfer juice jacking powerba

Explained: war shipping

Yesterday, Mike from the mailroom came up and asked whether I knew anyone called “Simon Smith.” He received an envelope addressed to our company and to the attention of Mr. Smith, but there was no one by that name on his list of employees. It wasn’t on mine either and HR was unaware of a person by that name ever employed here. Nor did we expect anyone by
Publish At:2019-10-08 23:20 | Read:980 | Comments:0 | Tags:Explained fluxion kismet raspberry pi war driving war shippi

Explained: security orchestration

Working together in perfect harmony like the wind and percussion sections of a symphony orchestra requires both rigorous practice and a skilled conductor. Wouldn’t it be great if our cybersecurity solutions did the same to better protect organizations? The methods and tools used to accomplish this are often referred to as security orchestration. Even tho
Publish At:2019-10-02 23:20 | Read:1175 | Comments:0 | Tags:Explained automated threat response Incident Response incide

Tools

Tag Cloud