HackDig : Dig high-quality web security articles for hacker

The Power and Versatility of Pervasive Encryption

As cyberthreats make headlines, companies across the globe are working hard to develop efficient IT infrastructures capable of protecting sensitive data and maintaining compliance with privacy regulations. Although it checks both of these boxes, many organizations have been hesitant to adopt encryption due to cost, operational impact, the complexity of key m
Publish At:2017-11-04 02:00 | Read:278 | Comments:0 | Tags:Data Protection Mainframe Application Security Encryption En

Nine More NCSAM Tips for Cybersecurity Professionals: Week Four

What have you learned during National Cybersecurity Awareness Month (NCSAM) that could help drive change in your organization? We’ve featured 22 tips so far, so there should be at least a few things for you to work on. Maybe your company needs to revamp its cybersecurity training or do a better job managing data. As with anything in life, there is alwa
Publish At:2017-11-01 00:20 | Read:254 | Comments:0 | Tags:Risk Management Cybersecurity IBM IBM Security National Cybe

IBM Experts Weigh In on the Value of an Industry-Focused Approach to Security

To more closely align with the way clients think about security, IBM Security is focused on providing an open security immune system that enables organizations to integrate and leverage the investments they have already made within their specific industry. Experts Discuss the Benefits of an Industry-Focused Security Strategy We consulted six experts from the
Publish At:2017-08-30 20:10 | Read:477 | Comments:0 | Tags:Industries Automotive Industry Cloud Cloud Security Energy a

IDaaS Vendors: IBM Cloud Identity Service Named Market Leader in Six Recent Analyst Reports

Not one, not two, but six of the most recent analyst reports evaluating the major Identity and Access Management-as-a-Service (IDaaS) vendors positioned IBM Cloud Identity Service as an overall market leader in cloud-based identity and access management (IAM). The market is crowded with both startups and large IDaaS vendors, making this is a big win for IBM
Publish At:2017-08-16 09:00 | Read:303 | Comments:0 | Tags:Cloud Security Identity & Access Security Services Cloud Ide

Pervasive Encryption Simplifies Mainframe Security

On July 17, IBM unveiled its z14 mainframe server, which combines the traditional mainframe hardware with new capabilities in areas such as cloud, cognitive, analytics, application management, blockchain, machine learning and more. Most importantly, z14 includes enhanced security features — namely, pervasive encryption — to help clients stay one step ahead
Publish At:2017-08-04 20:10 | Read:1239 | Comments:0 | Tags:Data Protection Mainframe Application Security Encryption En

Accelerate Response With Orchestration

Organizations today are battling three compounding challenges: complex cyberattacks that shift as they unfold, complicated technology environments and a fast-growing skills gap. As a result, technologies and processes that enable a dynamic, fast and orchestrated response are becoming vital. IBM Resilient has many enterprise deployments around the world spa
Publish At:2017-07-28 03:30 | Read:420 | Comments:0 | Tags:Incident Response IBM IBM Security Incident Response (IR) Re

Hello, My Name Is Space Rogue

IBM X-Force Red marked its first-year anniversary with the addition of security specialists, including Space Rogue, who increases the team’s impressive roster of talent. Hello, my name is Space Rogue. Well, actually, it’s Cris Thomas, but the security community is most likely to recognize my work over the past two decades under my pseudonym. The
Publish At:2017-07-28 03:30 | Read:519 | Comments:0 | Tags:Application Security Security Services X-Force Research IBM

IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas

Earlier this year, I gave a talk at the RSA Conference about the privacy and security flaws in many of today’s connected cars. The response was nothing short of astounding. As it turns out, people get very nervous when you talk about finding and controlling their cars from a mobile phone. While I didn’t initially set out to find vulnerabilities i
Publish At:2017-07-24 17:25 | Read:361 | Comments:0 | Tags:Application Security Industries Software & App Vulnerabiliti

IBM Named a Leader in Inaugural Gartner Magic Quadrant for Access Management, Worldwide

Gartner has named IBM a Leader in its first-ever Magic Quadrant for Access Management, Worldwide. Both IBM Security Access Manager and Cloud Identity Service were evaluated in this new report, alongside 14 other vendors. IBM was placed as a Leader for completeness of vision and ability to execute. IBM Leads the Way in Access Management According to Gartne
Publish At:2017-06-29 09:20 | Read:613 | Comments:0 | Tags:Identity & Access Access Management Cloud Identity Service G

Changing How We Educate and Hire With a New Collar Approach

Earlier this month, I had the privilege to attend the IBM Security Summit in New York. Among the many great presenters and events during the day was a panel discussion on new and better ways to tackle the cybersecurity skills gap facing governments, industries and academia, and how a new collar approach can help. The need for skilled cybersecurity talent i
Publish At:2017-06-15 13:50 | Read:476 | Comments:0 | Tags:CISO Academia Education IBM IBM Security Professional Develo

Digital Transformation Means Infusing Identity Everywhere

Organizations are rapidly adopting new technologies such as cloud, mobile and the Internet of Things (IoT) to facilitate and accelerate digital transformation. Securing these environments means managing identities throughout the organization, and next-generation identity and access management (IAM) strategies must give IT the ability to swiftly enable cloud,
Publish At:2017-06-14 01:00 | Read:668 | Comments:0 | Tags:Cloud Security Identity & Access Access Management Cloud Clo

Cisco and IBM Raise Cybersecurity to the Power of Two

In the world of cybercrime, there are very few lone wolves out there plotting and launching major attacks. In fact, cybercriminals collaborate actively with one another, as well as wealthy financial backers within organized crime and nation-states, making cybersecurity ever more challenging. A United Nations study found that crime rings that actively share d
Publish At:2017-05-31 16:50 | Read:675 | Comments:0 | Tags:CISO Cisco Cybersecurity IBM IBM Security Information Sharin

Personalizing Energy Security With Robust Analytics

I’m both fascinated and excited by the rise of the prosumer — a proactive energy consumer who uses smart devices to manage consumption, add renewables to the mix and look for personalized services from his or her utility — especially within the context of energy security. Recent security concerns surrounding WannaCry ransomware are all the more relev
Publish At:2017-05-26 08:00 | Read:543 | Comments:0 | Tags:Cognitive Energy & Utility Security Intelligence & Analytics

Incident Response: Planning for the Attack Before It Happens

By now, you’ve no doubt heard of WannaCry, the ransomware attack that impacted over 300,000 victims in more than 100 countries over the past 10 days. While we’ve all focused on effective patching strategies to prevent further infection, an important part of the discussion is how to plan for a successful incident response (IR) to ransomware and o
Publish At:2017-05-25 13:35 | Read:591 | Comments:0 | Tags:Incident Response X-Force Research IBM IBM Security IBM X-Fo

Cybersecurity Hiring Woes? Time to Consider a New Collar Approach

“There are over 5 million jobs open in this country. The reason they are not filled is skills.” — Ginni Rometty, IBM CEO, speaking to Fox Business about new collar jobs. Organizations are suffering from an inability to fill vacant technology and cybersecurity positions. A four-year wait for students to complete their curricula is an eternity fo
Publish At:2017-05-22 11:55 | Read:867 | Comments:0 | Tags:CISO Academia Cybersecurity Jobs Education IBM Professional

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud