HackDig : Dig high-quality web security articles

Why Security Configuration Management (SCM) Matters

In the Godfather Part II, Michael Corleone says, “There are many things my father taught me here in this room. He taught me: keep your friends close, but your enemies closer.” This lesson Vito Corleone taught his son Michael is just as applicable to IT security configuration management (SCM).Faster breach detectionToday’s cyber threat landscape is extremely
Publish At:2022-07-04 06:20 | Read:112 | Comments:0 | Tags:Featured Articles Security Configuration Management Infosec

CISO Interview Series: The challenges of being the CISO for the University of Oxford.

The job of a CISO is one of constant change and unexpected challenges.  One of the most energetic environments to govern is that of a university. Universities function not only as academic institutions, but also as research hubs, hosting both curious students, as well as notable scholars.  This is an audience not known for slow-motion progress. The
Publish At:2022-07-04 01:06 | Read:67 | Comments:0 | Tags:Featured Articles IT Security and Data Protection CISO cyber

The Need of Privacy Certifications for Lawyers

The widespread adaptability and integration of tools and the professionals who can effectively use them to comply with the law will significantly impact the careers of both lawyers and other legal personnel. One of the fastest-growing areas in the legal profession in the United States is Privacy Law. Privacy certifications endorse attorneys as credentialed p
Publish At:2022-07-04 01:06 | Read:107 | Comments:0 | Tags:Featured Articles IT Security and Data Protection certificat

Black Basta ransomware – what you need to know

What is Black Basta?Black Basta is a relatively new family of ransomware, first discovered in April 2022.Although only active for the past couple of months, the Black Basta ransomware is thought to have already hit almost 50 organisations – first exfiltrating data from targeted companies, and then encrypting files on the firm’s computer systems.V
Publish At:2022-06-30 13:00 | Read:134 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cyberattac

The Role of IAM in Maintaining Cloud Security

Cloud computing is an effective solution for large and small companies across every industry. There has been rapid adoption due in large part to its accessibility, flexibility, and reliability. The cloud environment brings a significant amount of benefits, but at the same time, it can expose businesses to various alarming cybersecurity risks.A study conducte
Publish At:2022-06-29 01:05 | Read:229 | Comments:0 | Tags:Cloud Featured Articles cloud security IAM identity and acce

Are Protection Payments the Future of Ransomware? How Businesses Can Protect Themselves

Ransomware has matured significantly over the previous decade or so. Initially thought to be a relatively basic virus that could be contained on a floppy disk, it can now damage global business infrastructures, stop healthcare systems dead in their tracks, mess with fuel supply networks, and disrupt transportation infrastructure.Its simplicity is what makes
Publish At:2022-06-28 01:06 | Read:168 | Comments:0 | Tags:Featured Articles IT Security and Data Protection payment ra

How to Protect Your Remote Workforce from a Cyberattack

Earlier this year, an industry report stated that 79% of businesses remain concerned about the security risks of an increasingly remote workforce. Cyberattacks are on the rise since the COVID-19 pandemic, in part because many organizations fail to put in place adequate cybersecurity measures and procedures.In addition, there is a worldwide shortage of cybers
Publish At:2022-06-26 21:07 | Read:309 | Comments:0 | Tags:Cyber Security Featured Articles cyberattack Remote working

NHS warns of scam COVID-19 text messages

The UK’s National Health Service (NHS) has warned the public about a spate of fake messages, sent out as SMS text messages, fraudulently telling recipients that they have been exposed to the Omicron variant of COVID-19.In a tweet, the NHS said that it had seen reports of text messages that claimed to come from the NHS, telling recipients that they had
Publish At:2022-06-23 12:59 | Read:231 | Comments:0 | Tags:Featured Articles

NIST SP 800-161r1: What You Need to Know

Modern goods and services rely on a supply chain ecosystem, which are interconnected networks of manufacturers, software developers, and other service providers. This ecosystem provides cost savings, interoperability, quick innovation, product feature diversity, and the freedom to pick between rival providers. However, due to the many sources of compone
Publish At:2022-06-22 02:14 | Read:151 | Comments:0 | Tags:Featured Articles Regulatory Compliance NIST Risk Management

Q1 2022 Phishing Threat Trends and Intelligence Report

In 2022, phishing attacks have not only increased substantially, but they have also taken a new turn of events. According to the Agari and PhishLabs Quarterly Threat Trends & Intelligence report, phishing attacks are gradually being delivered through a wide range of online platforms.  The classic email phishing attack technique has increased slightl
Publish At:2022-06-21 02:14 | Read:202 | Comments:0 | Tags:Featured Articles IT Security and Data Protection intelligen

The actual cost of a breach – reputation, loss of customers, fines, suspension of business

According to IBM’s Cost of a Data Breach report In 2021, data breach costs rose from $3.86 million to $4.24 million, exhibiting the highest average total cost in the 17-year history of their report.A new report from the Department for Culture, Media, and Sport (DCMS) has revealed that data breaches have become more costly for medium and large businesses in t
Publish At:2022-06-21 02:14 | Read:184 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cost data

Cyberthreat Defense Report 2022: Key Points You Should Know

Each year, CyberEdge publishes the Cyberthreat Defense Report (CDR). Aimed at IT security leaders, this comprehensive report outlines the threats, security issues, and industry concerns that are most pressing.Information summarized in the CDR is gathered through surveys conducted in 17 countries and 19 industries. Respondents are IT decision-makers in organi
Publish At:2022-06-20 02:14 | Read:231 | Comments:0 | Tags:Cyber Security Featured Articles Cyberthreat Report cyber

Reexamining the “5 Laws of Cybersecurity”

Nearly a year ago, journalist Martin Banks codified “Five Laws of Cybersecurity”. Cybersecurity is a complicated field, and any way to simplify its many facets into short, easy-to-remember maxims is always welcome. The five laws are a very good start towards developing a robust security program. The laws are:Treat everything like it’s vulnerable.Assume peopl
Publish At:2022-06-20 02:14 | Read:214 | Comments:0 | Tags:Cyber Security Featured Articles best practice cybersecurity

Interpol arrests thousands of scammers in operation “First Light 2022”

Law enforcement agencies around the world appear to have scored a major victory in the fight against fraudsters, in an operation that seized tens of millions of dollars and seen more than 2000 people arrested.Operation “First Light 2022”, running for two months from March 8 2002 until May 8 2022, saw 76 countries clamp down on organised crime rin
Publish At:2022-06-16 11:25 | Read:309 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Latest Sec

What you need to know about PCI 4.0: Requirements 1, 2, 3 and 4.

The Payment Card Industry Security Standards Council has released its first update to their Data Security Standard (PCI DSS) since 2018.  The new standard, version 4.0, is set to generally go into effect by 2024, but there are suggested updates that are not going to be required until a year after that.  This, of course, creates a couple of problems
Publish At:2022-06-14 06:12 | Read:263 | Comments:0 | Tags:Featured Articles PCI PCI DSS pci dss requirements Regulator


Share high-quality web security related articles with you:)
Tell me why you support me <3