HackDig : Dig high-quality web security articles for hackers

Visibility and Threat Detection in a Remote Working World

At the outset of the COVID-19 pandemic, when governments around the world put stay-at-home orders in place, it was hard to imagine the state of work would permanently change. Yet, as organizations rapidly adopted and expanded systems to enable a remote workforce — which doubled in size in just three weeks — company cultures began shifting, too. As employees
Publish At:2020-06-24 11:06 | Read:91 | Comments:0 | Tags:CISO Endpoint Security Intelligence & Analytics Threat Hunti

The Journey to Simplicity: User Experience in Security

Keeping an organization secure is no easy task, especially with the explosion in cloud adoption and digital transformation against a backdrop of increasingly dangerous threats and threat actors. We can all recite the challenges that security teams struggle with — too many solutions, not enough people, not enough visibility. With the average organization dep
Publish At:2020-06-10 11:12 | Read:140 | Comments:0 | Tags:Security Intelligence & Analytics Threat Hunting Design Thin

Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

Gone are the days of the Nigerian prince promising fortune to unsuspecting email recipients. Attackers have stepped up their phishing game and evolved their tactics to entice employees to click links or open attachments, preying on the opportunity to spread persistent malware or compromise credentials. These threat actors relentlessly target employees — both
Publish At:2017-08-24 16:50 | Read:3894 | Comments:0 | Tags:Fraud Protection Security Intelligence & Analytics Employee

Advanced Approaches to ATM Network Protection

End-to-end automated teller machine (ATM) network protection encompasses multiple security layers. Is it not enough to simply protect ATM endpoints to ensure the security of a bank’s finances. Instead, security teams at financial institutions must take a more advanced approach to ATM network protection. ATM security has always been a hot-button issue
Publish At:2017-08-11 15:05 | Read:6456 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Network Securi

Preventative Medicine: Get a Health Check for Your SIEM

As a child, I used to dread going for my annual checkup. Whether it was the anxiety of receiving shots or being poked and prodded, the lollipop at the end never really made up for the angst beforehand. With age comes wisdom, however, and I now understand why a health check is important for the human body to function properly. In a security scenario, a health
Publish At:2017-07-12 10:20 | Read:3260 | Comments:0 | Tags:Security Intelligence & Analytics IBM QRadar SIEM IBM Securi

Using SIEM Solutions to Connect the Security Dots and Detect Ransomware

Many companies, organizations, groups and individuals who are vigilant in the face of new cyberthreats create highly advanced detection and prevention systems to help potential victims identify and remediate security events as quickly as possible. While these controlling, monitoring and alerting mechanisms can be used in isolation, their true value lies in
Publish At:2017-07-07 01:30 | Read:4916 | Comments:0 | Tags:Security Intelligence & Analytics IBM QRadar SIEM Malware Ra

Spot (and Remedy) the Rotten Apple Before It Spoils the SIEM Barrel

We all have heard the proverb: One rotten apple can spoil the whole barrel. This also applies to many practical scenarios in our day-to-day life, like finding a stinky sock in a pile of fresh laundry. Similarly, in a security operations center (SOC), one of the tasks security analysts spends most of their time on is identifying and detecting the actual threa
Publish At:2017-07-05 12:40 | Read:3950 | Comments:0 | Tags:Incident Response Security Intelligence & Analytics Collabor

The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center

Organizations are increasingly clustering their skills and capabilities into security operations centers (SOCs). An SOC is a focused facility where security specialists monitor, assess and defend against computer security issues. Introducing virtual reality (VR) and augmented reality (AR) technology into this environment can enhance the team’s performa
Publish At:2017-07-03 23:50 | Read:3936 | Comments:0 | Tags:Security Intelligence & Analytics IBM QRadar SIEM Security I

Game Over: Improving Your Cyber Analyst Workflow Through Gamification

Gamification — the process of applying game principles to real-life scenarios — is everywhere, from U.S. army recruitment to immersive cybersecurity training. Employee satisfaction and motivation can be fickle. In a job that requires both repetition and razor-sharp focus to pinpoint anomalies, it can be difficult to maintain an edge. This can lead to burnout
Publish At:2017-06-24 00:25 | Read:4552 | Comments:0 | Tags:Incident Response Security Intelligence & Analytics IBM QRad

Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications

Microsoft Office 365 is popular — very popular. In 2016, Gartner reported that 78 percent of enterprises surveyed used or planned to use Office 365. With access to a range of user activity events from a variety of sources, including Exchange Online, SharePoint Online and Azure Directory, how can Office 365 administrators correlate all this valuable data wit
Publish At:2017-05-26 08:10 | Read:4823 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Security In

Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security

There’s a famous quote that goes something like this: “Unapplied knowledge never benefited anyone.” I remember learning that back in college when working on a group project for a professor I’d had the previous semester. I earned a strong A in his class the first term, but the project we turned in the second time around didn’t g
Publish At:2017-05-19 10:05 | Read:4281 | Comments:0 | Tags:Endpoint Security Intelligence & Analytics Endpoint Manageme

More Than Meets the Eye: Five Common Misunderstandings About SIEM Solutions

Security information and event management (SIEM) is top-of-mind for many chief information security officers (CISOs). There are many common challenges related to the implementation of SIEM, some of which are rooted in false expectations and inconsistent views. This is a good reason to address five of the most common misunderstandings associated with SIEM, wh
Publish At:2017-05-14 01:10 | Read:4699 | Comments:0 | Tags:Security Intelligence & Analytics Compliance IBM QRadar SIEM

Address Registry and File Activity Monitoring Requirements With the Snare Log Analysis App

As Sir Arthur Conan Doyle wrote, “There is nothing more deceptive than an obvious fact.” While playing with building blocks with my toddler, I realized it is always tricky to find the right piece from the bunch of small pieces. It was the extra pair of eyes — my daughter’s — that helped me find the next relevant piece from the pile. The sma
Publish At:2017-04-28 14:00 | Read:3710 | Comments:0 | Tags:Risk Management Security Intelligence & Analytics IBM QRadar

QRadar Waves From the Leader Position in the Forrester 2017 Security Analytics Wave

Co-authored by Nicole Trager. Forrester just published its first ever Security Analytics Wave. IBM Security is proud to hold a top right position, with the highest scores in solution strength and vision of all the evaluated products. Forrester developed and applied a 36-criteria evaluation of security analytics (SA) providers and, as a result, identified the
Publish At:2017-03-14 11:25 | Read:3244 | Comments:0 | Tags:Cognitive Risk Management Security Intelligence & Analytics

Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations

Every five or six years, I find myself facing another major consumer purchase decision. My car gets old and my transportation needs change, for instance. It’s not quite as strategic as choosing a security analytics solution to protect a corporate enterprise, but neither I nor a chief information security officer (CISO) wants to regret the ultimate deci
Publish At:2017-03-10 12:10 | Read:4109 | Comments:0 | Tags:Cloud Security Security Intelligence & Analytics Cloud IBM Q


Share high-quality web security related articles with you:)