HackDig : Dig high-quality web security articles for hacker

Technology Treatment Plan: The Health Care Cybersecurity Imperative

Health care is under siege from cybersecurity threats. As noted by Healthcare IT News, another large-scale health insurance vendor recently shuttered its patient portal to deal with vulnerabilities that exposed personal data. Meanwhile, Beta News reported that 43 percent of all data breaches in the U.K. come from the health care sector. Now, the U.S. Departm
Publish At:2017-06-14 19:25 | Read:162 | Comments:0 | Tags:Data Protection Health Care Cybersecurity Legislation Federa

Building Upon Trump’s Executive Order on Cybersecurity

Just days after President Trump signed his executive order on cybersecurity, the massive WannaCry attack dominated the news cycle. The assault infiltrated 150 countries, penetrating national networks and infrastructure. A breach of such international scale has rightly raised questions about government preparedness for digital warfare. In answering these co
Publish At:2017-06-09 10:30 | Read:203 | Comments:0 | Tags:Government Cybersecurity Cybersecurity Framework Federal Gov

100-Day Government IT Roundup: Immigration, Innovation and Information Security in Trump’s America

The first 100 days of President Trump’s term have come and gone, with the new leader tackling challenges such as health care, border protection and reinvigorating American business. But what about government IT? Cybersecurity and modernization were hot-button topics during the election, fueled in part by repeated breaches of private organizations by
Publish At:2017-05-14 01:10 | Read:370 | Comments:0 | Tags:Government Cybercrime Cybersecurity Federal Government Feder

Weaponized NSA-Grade Malware Brings Down Industry Verticals, But Not Bromium’s Customers

Weaponized NSA Grade Malware catastrophically brought down enterprises worldwide May 12, 2017 Patches have been available for months. U.S. Presidential Executive Order issued May 11, 2017 asserted that the greatest threat to U.S. Cyber integrity are “Known attacks” WannaCry could have been prevented by applying the right cyber security architecture WannaCry
Publish At:2017-05-13 12:35 | Read:407 | Comments:0 | Tags:Breaking News Government Canada government hacker Malware NS

Building an Effective CISO-CIO Partnership

For many, the most common reporting structure in today’s business environment is overly complicated. The majority of security leaders around the world report directly to the chief information officer (CIO), which can cause an enormous amount of conflict. That reporting structure, however, is slowly changing for some companies. In those organizations,
Publish At:2017-04-27 01:10 | Read:443 | Comments:0 | Tags:CISO Government C-Suite Chief Information Officer (CIO) Chie

The New Battlefield: Why Nation-State Malware is Winning

This warfare is being fought with computers and special created malware. It is Cyber Warfare and every large nation is playing along The most recent exposed vulnerability from Microsoft demonstrates exactly the type of method Nation-State attackers’ use. So how does a nation as sophisticated as the United States keep losing the cyber battle? The problem lie
Publish At:2017-04-25 18:10 | Read:326 | Comments:0 | Tags:Government Threats Battlefield CIA criminals Federal governm

Microsoft Office Malware Captured in a Micro-VM on an Unpatched Computer

The Bromium Labs team was able to get their hands on some live malware exploiting the Microsoft office vulnerability. First and foremost, on an unpatched workstation Bromium did its job by hardware isolating the Microsoft Word document into a protected virtual machine so that the host workstation was never infected. Secondly, it shows the amazing analytics
Publish At:2017-04-18 02:05 | Read:440 | Comments:0 | Tags:Breaking News Threats anti-virus command control EDR Events

Zero-Day Vulnerability is a Zero-Sum Game

Late last week a new Microsoft Office vulnerability was discovered by McAfee; they discovered attacks exploiting this vulnerability back to late January 2017. This should raise substantial concern for anyone responsible for cyber security at their company or federal agency. Since January, every Windows-based MS Office machine was exposed to the worst type o
Publish At:2017-04-16 13:05 | Read:367 | Comments:0 | Tags:Breaking News Government Threats Malware McAfee Microsoft Of

Malware is Becoming Alarming. Can You Hear Me Now?

A supposed “white hat” hacker gained access to the network of the Dallas Office of Emergency Management and managed to set off 156 sirens used to alert of an emergency Alarms blared for 90 minutes before the city was able to manually shut down the entire system. How does this continue to happen? Because the current method of stopping malware just isn’t work
Publish At:2017-04-16 13:05 | Read:460 | Comments:0 | Tags:Breaking News Government Threats Alarms application isolatio

Achieving Cyber Resilience with Next-Gen AV and Bromium Application Isolation

Detection-based techniques will always be one step behind the attacker. Extend NGAV using next gen virtualization with application isolation and control. Applications with the sensitive data are completely hardware-isolated from the host. In 2016, organizations spent over $80 billion on cybersecurity, while cybercriminals made $3 trillion in profit. Cybers
Publish At:2017-03-28 16:25 | Read:466 | Comments:0 | Tags:Compliance Government

Attention Federal Agencies: You Aren’t Stopping All Malware

On March 4th 2016 an endpoint at a U.S. Federal Agency encountered the Angler EK TeslaCrypt while browsing a web site (hxxp://pssor.com/pssor-home) with Internet Explorer. At the time the malware was executed on the endpoint (March 4th 2016), this was not known by any anti-virus vendor. In fact, the earliest this was discovered was March 7th 2016. Due to Br
Publish At:2017-03-23 07:30 | Read:478 | Comments:0 | Tags:Government

The New York State Department of Financial Services: The Evolution of a Regulation – Part 1

The New York State Department of Financial Services has proposed a cyber security regulation that is unique in its breadth. The original proposed regulation underwent a 45-day review period, after which it was changed. It is currently under another 45-day review period pending further changes and should be published in the next few weeks.The regulation affec
Publish At:2017-02-27 10:30 | Read:647 | Comments:0 | Tags:Featured Articles Government CISO New York security

Cybersecurity Regulations Get Demanding

As more government agencies get involved with creating cybersecurity regulations, security professionals will need to monitor new laws and understand which apply to their industry and whether some overlap or conflict. Increased enforcement from different agencies can mean significant consequences even if breaches are avoided. As the new administration adjust
Publish At:2017-02-25 03:50 | Read:682 | Comments:0 | Tags:CISO Government and Federal Risk Management Chief Informatio

New Wine in Old Bottles? – Continuity and Change in Trump Administration Cybersecurity Policy

The revised – and still draft – version of the Trump Administration’s first Executive Order (EO) on cybersecurity shows both continuity and positive change over the Obama Administration’s policy pronouncements, addressing federal agency network protection, critical infrastructure cybersecurity, and national cyber defense priorities.Federal Networ
Publish At:2017-02-23 14:05 | Read:872 | Comments:0 | Tags:Featured Articles Government security Trump

5 non-negotiable principles to combat cyber war on mobile

Cyber war is a term the U.S. government is intimately familiar with, but woefully unprepared for when it comes to mobile. Government employee mobile devices are a relatively new attack surface, and a particularly valuable one for espionage missions and other criminal intent. Mobile devices access confidential, classified, and other protected data classes. A
Publish At:2017-02-17 03:30 | Read:680 | Comments:0 | Tags:Enterprise Mobile Security Uncategorized cyber war Federal g

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud