HackDig : Dig high-quality web security articles for hackers

Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

Healthcare cybersecurity attacks are on the rise. As Protenus notes, industry data breaches increased by 48 percent between 2018 and 2019, with more than 41 million patient records compromised. Meanwhile, according to the 2019 HIMSS Cybersecurity Survey, 82 percent of hospitals said they suffered a “significant security incident” in the past 12 m
Publish At:2020-03-09 11:15 | Read:1070 | Comments:0 | Tags:Healthcare Risk Management Artificial Intelligence (AI) Cybe

How Human Security Investments Created a Global Culture of Accountability at ADP

Practice doesn’t necessarily make perfect, but it can lead to improvement. Quality practice is key in matters of human security, and the right quantity of practice can also make a significant difference when it comes to shifting mindsets and behavior. “Scientists believe that expert-level performance is primarily the result of expert-level practi
Publish At:2020-03-04 13:39 | Read:647 | Comments:0 | Tags:CISO Artificial Intelligence (AI) Chief Information Security

We Need More Than Security Awareness to Combat Insider Threats

When I was new to the security industry, I firmly believed that people got infected with malware because they didn’t know how to be safe online. I thought problems happened because computers were too complicated, or the technology was too daunting, or people were just too trusting and naive. But clearly I knew better. I saw the dangers lurking on the i
Publish At:2020-02-12 10:40 | Read:767 | Comments:0 | Tags:CISO Human Error Human Factor Insider Threats Security Aware

Biased AI Is Another Sign We Need to Solve the Cybersecurity Diversity Problem

Artificial intelligence (AI) excels at finding patterns like unusual human behavior or abnormal incidents. It can also reflect human flaws and inconsistencies, including 180 known types of bias. Biased AI is everywhere, and like humans, it can discriminate against gender, race, age, disability and ideology. AI bias has enormous potential to negatively affect
Publish At:2020-02-09 10:30 | Read:774 | Comments:0 | Tags:Artificial Intelligence CISO Artificial Intelligence (AI) Co

Getting an Earful: Convincing Employees to Care About Network Security

Employees remain the biggest source of corporate cyber risk. According to the “IBM X-Force 2016 Cyber Security Intelligence Index,” staff members are responsible for 60 percent of all digital attacks endured by enterprises. In most cases, there’s no malicious intent. Employees may subvert network security by opening infected email attachmen
Publish At:2017-09-29 11:51 | Read:4028 | Comments:0 | Tags:CISO Network Chief Information Security Officer (CISO) Educa

Security Specialists Discuss Identity and Access Management in the Age of Ransomware

Over the past few months, we have seen widespread attacks such as NotPetya and WannaCry cripple organizations at record scale and speed, either for monetary gain or with the sole purpose of causing destruction. In their wake, many professionals are assessing what these new threats mean for their security strategies, infrastructures and policies. As a point o
Publish At:2017-09-07 15:10 | Read:3868 | Comments:0 | Tags:Identity & Access Authentication Human Factor Identity and A

Cloud Security Is Not an Either/Or

Now that cloud has become pervasive, organizations and individuals everywhere need to think about cloud security. To say that data is either fully secure or vulnerable in the cloud would be far too simplistic. Two Schools of Thought There are two widespread but opposite beliefs surrounding security in the public cloud: Abandon all hope! When you send dat
Publish At:2017-07-20 21:00 | Read:3610 | Comments:0 | Tags:Cloud Security Cloud Cloud Computing Data Breach Human Facto

Making Mistakes in Security

At some point in your career, you will make mistakes—small mistakes, big mistakes, even career-defining mistakes. I am writing this in retrospect because during the course of my job duties, I recently made a mistake. The details are irrelevant, but I wanted to share my experience with making mistakes in the professional world.Mistakes and human error in Info
Publish At:2017-03-22 03:20 | Read:8192 | Comments:0 | Tags:Featured Articles Security Awareness Human Factor security

Securing Human Endpoints Through Cyber Situational Awareness

“People are nothing more than another operating system,” Lance Spitzner, training director for the Securing the Human program at the SANS Institute, once remarked. “Computers store, process and transfer information, and people store, process and transfer information. They’re another endpoint. But instead of buffer overflows, people su
Publish At:2017-01-18 12:30 | Read:5038 | Comments:0 | Tags:Network & Endpoint Risk Management Data Breach Endpoint Endp

10 Best Practices In IT Security Management Automation

In my last blog post, I introduced the topic of automation and how it can help improve security posture. In this post, we’ll be covering some of the risks automation can mitigate against.Data Breaches and Cyber AttacksA recent survey by ISACA on organization preparedness indicated that only 38% of businesses were confident they were prepared to respond to a
Publish At:2016-09-16 17:10 | Read:3610 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cyber atta

How to Reduce Human Error in Information Security Incidents

According to the “IBM Security Services 2014 Cyber Security Intelligence Index,” 95 percent of information security incidents involve human error. Human error is not only the most important factor affecting security, but it is also a key factor in aviation accidents and in medical errors. Information security risk managers and chief information s
Publish At:2015-01-13 17:20 | Read:4172 | Comments:0 | Tags:CISO Data Protection Risk Management Chief Information Secur

Can cybercrime use the services of the regular companies?

The attacks from humans against the humans as the preliminary phase of a bigger cyber attack will become harder to mitigate, let’s see how the cybercrime works. Standard incident response requires finding out the real extend of the incident. This is why we have all the monitoring tools where we can find any matching patt
Publish At:2014-11-06 16:55 | Read:4196 | Comments:0 | Tags:Cyber Crime APT Cybercrime Hacking human factor incident res


Tag Cloud