HackDig : Dig high-quality web security articles for hacker

Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks?

2019 was a tough year for the overall cybersecurity of state and local governments and municipal institutions. If you follow security news, there were times when not a week would go by without word of how the latest municipal cyberattacks impeded or even halted day-to-day operations. This stream of recent hacking incidents targeting government and municipal
Publish At:2020-02-21 13:22 | Read:118 | Comments:0 | Tags:Data Protection Government Cyberattacks Data Breach Healthca

U.S. Department of Defense Disclosed Data Breach at DISA

The U.S. Department of Defense (DoD) warned that a data breach at the Defense Information Systems Agency (DISA) might have compromised some individuals’ personal information.In a photograph of a letter obtained by Reuters, DISA CIO and Risk Management Executive Roger S. Greenwell warned recipients that a data breach might have compromised their persona
Publish At:2020-02-21 09:25 | Read:44 | Comments:0 | Tags:Government Latest Security News data breach Department of De

Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government

Cyberattacks on local government in the U.S. have increased dramatically over the last several years. In 2019 alone, ransomware affected more than 100 state and local governments, according to Recorded Future — and that’s just one threat vector. Municipalities are also at risk from insider threats, coordinated attacks and other perils. What is it about
Publish At:2020-02-17 18:22 | Read:199 | Comments:0 | Tags:Government Credit Card Data Cyberattacks Data Breaches Data

3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full effect, we saw expensive fines levied upon companies that fell victim to data privacy breaches. As we move into a new year, probably the biggest takeaway from 2019 is tha
Publish At:2020-02-12 10:40 | Read:218 | Comments:0 | Tags:Data Protection Government Automation Compliance Data Breach

Cloud Security and Artificial Intelligence in the Financial Sector

I recently had the honor of testifying before the House Financial Services Committee’s Taskforce on Artificial Intelligence about two critical emerging issues in the financial services sector – cloud and artificial intelligence (AI). Both have incredible potential for energizing the financial sector, but they also raise important security concerns. Financial
Publish At:2019-12-06 16:45 | Read:577 | Comments:0 | Tags:Executive Perspectives public sector artificial intelligence

Would ‘Medicare for All’ help secure health data?

DISCLAIMER: This post is not partisan, but rather focuses on risk assessment based on history and what threats we are facing in the future. We do not endorse any healthcare plan style in any way, outside of examining its data security risk. For many folks, the term ‘Healthcare for All’ brings up an array of emotions ranging from concern to happiness, and
Publish At:2019-11-26 21:50 | Read:861 | Comments:0 | Tags:Government Privacy Security world adam kujawa AMCA American

What Can We Learn From the ‘Global State of Information Security Survey 2018’?

In October 2018, PricewaterhouseCoopers (PwC) released the latest edition of “The Global State of Information Security Survey.” For this report, the professional services firm surveyed over 9,000 leaders, including CEOs, chief financial officers (CFOs), chief information officer (CIOs) and chief information security officers (CISOs), from 122 cou
Publish At:2017-11-02 13:10 | Read:4548 | Comments:0 | Tags:Risk Management Chief Information Officer (CIO) Chief Inform

Cybersecurity Strategy, Risk Management and List Making

When confronted with the daunting task of developing a cybersecurity strategy, many people don’t know where to start. The quick answer is to make a list of the tasks required to accomplish the project, organize them by functional categories and determine what resources need to be brought together to accomplish the tasks on the list. This might seem lik
Publish At:2017-10-03 08:40 | Read:4358 | Comments:0 | Tags:CISO Government Risk Management Cybersecurity Cybersecurity

e-Signature Security Speeds Government Paperwork Along

As public administrators have learned, efficiency in government is largely a matter of executing the small things well. A saved mailing expense or avoided delay can add up to a lot more work for a lot less tax money, which is one practical definition of good government in action. One example of this process is a current U.S. Census Bureau initiative to imple
Publish At:2017-09-11 19:25 | Read:6931 | Comments:0 | Tags:Data Protection Fraud Protection Government Authentication D

Government Agencies Must Work With the Private Sector to Bolster Infrastructure Security

Securing data is never easy. It often requires the infusion of outside expertise to put together an effective information security strategy. Data stored on government servers is especially valuable to both individual fraudsters and nation-state actors, and government agencies have been under pressure to enhance their infrastructure security capabilities and
Publish At:2017-08-18 13:25 | Read:4036 | Comments:0 | Tags:Data Protection Government Cybersecurity Cybersecurity Frame

The Godfathers of Virtualization Returning to VMWorld

Ian Pratt and Simon Crosby sold XenSource to Citrix in 2007. After working at Citrix, they decided to once again spin off and focus on cybersecurity. They are available to meet during VMWorld if you’d like to talk virtualization and security. We think of them as The Godfathers of Virtualization. They work they did with XenSource lead to what is today’s clo
Publish At:2017-08-15 17:35 | Read:5013 | Comments:0 | Tags:Company News application isolation browsing click cybersecur

From the Battlefield to the Security Operations Center: A New Collar Approach to the Skills Gap

Everyone in the industry knows that there is a huge demand for cybersecurity professionals and a worrying shortage of talent. In fact, Frost and Sullivan estimated that we will face 1.8 million unfilled cybersecurity positions by 2022. So how do we solve this problem — and fast? A recent executive report from the IBM Institute for Business Value (IBV) sugges
Publish At:2017-08-08 16:20 | Read:3874 | Comments:0 | Tags:CISO Government Cybersecurity Jobs Cybersecurity Training Pr

TechNet Augusta and DoDIIS Worldwide – Moving Government Cybersecurity Forward

We will be at TechNet Augusta on August 7-11. Visit us at booth 112. We will be at DoDIIS Worldwide Conference on August 13-16 in St. Louis. Visit us at booth 739. Discover how application isolation and containment is the long-term strategy for cyber resilience. If you’re responsible for government cybersecurity, we’ve got something you’l
Publish At:2017-08-03 12:45 | Read:3957 | Comments:0 | Tags:Government application isolation augusta containment demo do

Cybercrime Without Borders: Bridging Gaps Between Public and Private Sectors to Ensure a Safer Future

Imagine it’s lunchtime in Manhattan. Hundreds of thousands of people are leaving their desks to visit their favorite eatery and enjoy a short time away from the office. Suddenly, elevators across the city grind to a halt and a significant percentage of New York’s workforce is trapped. After too many hours, the overwhelmed emergency responders a
Publish At:2017-07-28 21:55 | Read:4021 | Comments:0 | Tags:Government Risk Management Collaboration Cybercrime Federal

Is Cloud Security a Safe Bet for Highly Sensitive Government Data?

Security is the primary focus of any government agency. One of the most obvious pitfalls of these agencies moving highly sensitive data to the cloud is that they surrender control to a third party. Moreover, nothing on the internet is truly secure, and all data is vulnerable to attacks and threats. The exposure footprint to those threats is staggering unde
Publish At:2017-07-28 21:55 | Read:4399 | Comments:0 | Tags:Cloud Security Data Protection Government Cloud Adoption Clo

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud