HackDig : Dig high-quality web security articles for hackers

Safeguarding Healthcare for the Future With Zero Trust Security

In 2019, we saw a record number of information security breaches. According to the IBM X-Force Threat Intelligence Index 2020, a total of 8.5 billion records were compromised — three times the number from 2018. The healthcare industry saw its fair share of attacks and was the 10th-most targeted industry, accounting for 3 percent of all attacks last year. Th
Publish At:2020-03-11 08:47 | Read:1057 | Comments:0 | Tags:Healthcare Identity & Access Access Management Advanced Pers

We Need More Than Security Awareness to Combat Insider Threats

When I was new to the security industry, I firmly believed that people got infected with malware because they didn’t know how to be safe online. I thought problems happened because computers were too complicated, or the technology was too daunting, or people were just too trusting and naive. But clearly I knew better. I saw the dangers lurking on the i
Publish At:2020-02-12 10:40 | Read:742 | Comments:0 | Tags:CISO Human Error Human Factor Insider Threats Security Aware

Securing Human Endpoints Through Cyber Situational Awareness

“People are nothing more than another operating system,” Lance Spitzner, training director for the Securing the Human program at the SANS Institute, once remarked. “Computers store, process and transfer information, and people store, process and transfer information. They’re another endpoint. But instead of buffer overflows, people su
Publish At:2017-01-18 12:30 | Read:5003 | Comments:0 | Tags:Network & Endpoint Risk Management Data Breach Endpoint Endp

UK Data Breaches Have Increased in Number, Scale and Cost, Reveals Study

Infosecurity Europe 2015, one of The State of Security’s top 10 conferences in information security, may be over but now is the perfect time for industry professionals to internalize all of the findings shared at the conference. One such piece of research that demands our attention is the 2015 Information Security Breaches Survey.Commissioned by the H
Publish At:2015-06-10 05:40 | Read:3755 | Comments:0 | Tags:Cyber Security Featured Articles 2015 Information Security B

To Err Is Human: Why Your Users’ Identity Is Your Security’s Weakest Link

With 2014 sometimes called “The Year of the Breach,” many organizations have realized their most serious security threat isn’t the external attack. Instead, it’s the user who can compromise or leak the organization’s most sensitive data — its “crown jewels” — either intentionally or accidentally. According to IBMR
Publish At:2015-04-15 17:30 | Read:3752 | Comments:0 | Tags:Identity & Access crown jewels Cybersecurity data-security h

How to Reduce Human Error in Information Security Incidents

According to the “IBM Security Services 2014 Cyber Security Intelligence Index,” 95 percent of information security incidents involve human error. Human error is not only the most important factor affecting security, but it is also a key factor in aviation accidents and in medical errors. Information security risk managers and chief information s
Publish At:2015-01-13 17:20 | Read:4164 | Comments:0 | Tags:CISO Data Protection Risk Management Chief Information Secur

Cybersecurity Awareness Is About Both ‘Knowing’ and ‘Doing’

Ask any IT security professional and you’ll get the same answer. One of the biggest cybersecurity challenges is the human factor, making cybersecurity awareness more vital than ever in our mobilized, interconnected world. According to the 2014 Cyber Security Intelligence Index, an astounding 95 percent of all security incidents involve human error. The most
Publish At:2014-10-01 23:20 | Read:4196 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) Cybersecurity

How a CISO Can Use Home Field Advantage to Defeat Attackers

Summer is over and as fall starts to settle in, football season starts again. It was while reviewing my son’s upcoming schedule that he pointed out that some of the earlier games in the season are against teams with more skilled players. However, he quickly pointed out that those games are at home and that this would be a big advantage to him and his t
Publish At:2014-09-24 22:50 | Read:3300 | Comments:0 | Tags:CISO Advanced Attacks Advanced Persistent Threat (APT) attac

The Role of Human Error in Successful Security Attacks

All humans make mistakes. One of the most intriguing findings from IBM’s “2014 Cyber Security Intelligence Index” is that 95 percent of all security incidents involve human error. Many of these are successful security attacks from external attackers who prey on human weakness in order to lure insiders within organizations to unwittingly pro
Publish At:2014-09-03 09:40 | Read:5130 | Comments:0 | Tags:CISO Risk Management attacks Cyber Security human error IBM

Tools

Tag Cloud