HackDig : Dig high-quality web security articles for hacker

Securing Medical Devices in the Age of the IoT

The U.S. Food and Drug Administration (FDA) cautioned the health care industry to be wary about networked medical devices containing off-the-shelf (OTS) software that can connect to networks. Both health care IT professionals and manufacturers are responsible for securing medical devices by performing regular software updates and applying security patches. S
Publish At:2017-11-06 09:40 | Read:3876 | Comments:0 | Tags:Endpoint Health Care Mobile Security Connected Devices Feder

Government Agencies Must Work With the Private Sector to Bolster Infrastructure Security

Securing data is never easy. It often requires the infusion of outside expertise to put together an effective information security strategy. Data stored on government servers is especially valuable to both individual fraudsters and nation-state actors, and government agencies have been under pressure to enhance their infrastructure security capabilities and
Publish At:2017-08-18 13:25 | Read:3831 | Comments:0 | Tags:Data Protection Government Cybersecurity Cybersecurity Frame

Cybercrime Without Borders: Bridging Gaps Between Public and Private Sectors to Ensure a Safer Future

Imagine it’s lunchtime in Manhattan. Hundreds of thousands of people are leaving their desks to visit their favorite eatery and enjoy a short time away from the office. Suddenly, elevators across the city grind to a halt and a significant percentage of New York’s workforce is trapped. After too many hours, the overwhelmed emergency responders a
Publish At:2017-07-28 21:55 | Read:3792 | Comments:0 | Tags:Government Risk Management Collaboration Cybercrime Federal

Estonia to Build Off-Site Data Center in Luxembourg

Lots of companies have disaster recovery data centers located far from their headquarters, but Estonia is the first government to build an off-site data center in another country. The small Baltic nation will make backup copies of its critical data infrastructure and store them in Luxembourg if agreements between the two countries are reached. The idea is th
Publish At:2017-07-27 00:40 | Read:4026 | Comments:0 | Tags:Data Protection Government Critical Infrastructure Data Cent

Technology Treatment Plan: The Health Care Cybersecurity Imperative

Health care is under siege from cybersecurity threats. As noted by Healthcare IT News, another large-scale health insurance vendor recently shuttered its patient portal to deal with vulnerabilities that exposed personal data. Meanwhile, Beta News reported that 43 percent of all data breaches in the U.K. come from the health care sector. Now, the U.S. Departm
Publish At:2017-06-14 19:25 | Read:5529 | Comments:0 | Tags:Data Protection Health Care Cybersecurity Legislation Federa

Building Upon Trump’s Executive Order on Cybersecurity

Just days after President Trump signed his executive order on cybersecurity, the massive WannaCry attack dominated the news cycle. The assault infiltrated 150 countries, penetrating national networks and infrastructure. A breach of such international scale has rightly raised questions about government preparedness for digital warfare. In answering these co
Publish At:2017-06-09 10:30 | Read:4739 | Comments:0 | Tags:Government Cybersecurity Cybersecurity Framework Federal Gov

100-Day Government IT Roundup: Immigration, Innovation and Information Security in Trump’s America

The first 100 days of President Trump’s term have come and gone, with the new leader tackling challenges such as health care, border protection and reinvigorating American business. But what about government IT? Cybersecurity and modernization were hot-button topics during the election, fueled in part by repeated breaches of private organizations by
Publish At:2017-05-14 01:10 | Read:4503 | Comments:0 | Tags:Government Cybercrime Cybersecurity Federal Government Feder

Cybersecurity Regulations Get Demanding

As more government agencies get involved with creating cybersecurity regulations, security professionals will need to monitor new laws and understand which apply to their industry and whether some overlap or conflict. Increased enforcement from different agencies can mean significant consequences even if breaches are avoided. As the new administration adjust
Publish At:2017-02-25 03:50 | Read:3820 | Comments:0 | Tags:CISO Government and Federal Risk Management Chief Informatio

Continuous Diagnostics and Mitigation: A Look Back and Preparing for Phase Three

Continuous monitoring, situational awareness, common operational picture, single pane of glass — these are just a few of the terms with which I’ve become well-acquainted throughout my career. Each one attempts to depict how security operation centers (SOCs) can reach the holy grail of data aggregation. To prevent, respond to or remediate a security inc
Publish At:2017-02-06 17:05 | Read:3854 | Comments:0 | Tags:Government and Federal Network & Endpoint continuous monitor

Increased Regulatory Compliance Is Choking the CISO

Chief information security officers (CISOs) love to laugh at ridiculous compliance regulations. In the financial industry, for example, some organizations are forced to comply with Regulations Systems Compliance and Integrity (RegSCI), Commodity Futures Trading Commission (CFTC) rule 39.18, the Committee on Payments and Market Infrastructures (CPMI), the Int
Publish At:2017-02-02 02:30 | Read:3214 | Comments:0 | Tags:CISO Compliance Data Protection Data Security Federal Govern

Tracking the Digital Transition in the White House

As President Donald Trump arrives at the White House to start his term, he faces a very different collection of technology than when former President Barack Obama entered eight years ago. Back then, government PCs sported floppy drives and no president ever personally used Twitter or other form of social media. Indeed, social media access was initially block
Publish At:2017-01-20 19:45 | Read:4253 | Comments:0 | Tags:Government and Federal Federal Government Federal Government

Lookout is “FedRAMP” ready, making it even easier for agencies to protect against mobile risks

Today, I am proud to announce that Lookout is now “FedRAMP Ready,” an indicator to federal agencies that Lookout Mobile Endpoint Security is vetted, secure, and can be quickly implemented into any U.S. government organization. Lookout is the first mobile security solution to achieve this status. The Federal Risk and Authorization Management Program (FedRAM
Publish At:2017-01-19 17:25 | Read:3084 | Comments:0 | Tags:Enterprise Mobile Security federal government FedRAMP govern

The U.S. Federal CISO and His First 100 Days

In September 2016, the White House announced the appointment of retired Brig. Gen. Gregory J. Touhill as the first federal chief information security officer (CISO). Touhill’s job is to drive cybersecurity, planning and implementation across the government. This announcement is presented as the culmination of several actions undertaken by the executive
Publish At:2016-12-09 22:10 | Read:3640 | Comments:0 | Tags:CISO Government and Federal Chief Information Security Offic

Rising Attack Rates and Massive Breaches Plague Government Organizations

A government’s core role is to protect and enhance the lives of its citizens. It must deliver services to create and sustain a robust and efficient public infrastructure, ensure public safety, foster sustainable economic growth and build stronger communities. Those tasks bring many challenges, but the overriding requirement of security is common to the
Publish At:2016-12-07 14:40 | Read:4393 | Comments:0 | Tags:Government and Federal Vulns / Threats X-Force Research Fede

Presidential Commission on Enhancing National Cybersecurity: Prioritize mobile security now

The Presidential Commission on Enhancing National Cybersecurity released its report on securing and growing the digital economy  in which one message is clear: de-prioritizing mobile security is no longer an option. New priorities for a new mobile workplace “The days of employees working only at an office using an organization-issued desktop computer fully
Publish At:2016-12-06 12:20 | Read:3446 | Comments:0 | Tags:Enterprise Mobile Security Security cybersecurity D.C. feder


Share high-quality web security related articles with you:)


Tag Cloud