HackDig : Dig high-quality web security articles for hacker

The Power and Versatility of Pervasive Encryption

As cyberthreats make headlines, companies across the globe are working hard to develop efficient IT infrastructures capable of protecting sensitive data and maintaining compliance with privacy regulations. Although it checks both of these boxes, many organizations have been hesitant to adopt encryption due to cost, operational impact, the complexity of key m
Publish At:2017-11-04 02:00 | Read:261 | Comments:0 | Tags:Data Protection Mainframe Application Security Encryption En

CIAM Vendors Report: IBM Cloud Identity Service Named Market Leader in Consumer IAM Leadership Compass

In the most recent Leadership Compass for CIAM, KuppingerCole analyzed CIAM vendors and named IBM Cloud Identity Service a market leader in the consumer identity and access management (CIAM) space. The CIAM analyst and author of the Leadership Compass, John Tolbert, provided a helpful overview of the consumer IAM market as well as a compass for readers to us
Publish At:2017-11-01 18:45 | Read:133 | Comments:0 | Tags:Cloud Security Identity & Access Cloud Computing Cloud Ident

Nine More NCSAM Tips for Cybersecurity Professionals: Week Four

What have you learned during National Cybersecurity Awareness Month (NCSAM) that could help drive change in your organization? We’ve featured 22 tips so far, so there should be at least a few things for you to work on. Maybe your company needs to revamp its cybersecurity training or do a better job managing data. As with anything in life, there is alwa
Publish At:2017-11-01 00:20 | Read:231 | Comments:0 | Tags:Risk Management Cybersecurity IBM IBM Security National Cybe

Unexpectedly Useful Skills for Careers in Cybersecurity

Of all the weird quirks I had as a kid, I never expected that my fascination with untying knots in the yarn from the arts and crafts box in fourth grade would benefit me in my job today. I recently did an interview for Business Radio X about one of IBM Security’s initiatives to raise awareness about careers in cybersecurity among middle school girls. T
Publish At:2017-10-26 19:35 | Read:238 | Comments:0 | Tags:CISO Academia Career Education IBM Security Professional Dev

Today’s Predictions for Tomorrow’s Internet: IBM Experts Look Ahead for NCSAM

In case you haven’t noticed the flood of dedicated content here on SecurityIntelligence, not to mention Twitter, we are currently in the midst of National Cyber Security Awareness Month (NCSAM). The overarching theme of this year’s campaign is “Securing the Internet Is Our Shared Responsibility,” which is a critical lesson to remember
Publish At:2017-10-22 05:00 | Read:154 | Comments:0 | Tags:CISO Education IBM Security National Cyber Security Awarenes

Practice: The Best Defense for Responding to Cyber Incidents

First responders have proven time and time again the valuable help they provide to people in need. Right now, we’re seeing their bravery with the historic hurricanes, fires and floods impacting millions of people. What makes first responders confident in the face of such danger? One word: practice. And this lesson is translating to the private sector i
Publish At:2017-10-22 05:00 | Read:187 | Comments:0 | Tags:Banking & Financial Services Data Protection Incident Respon

What Do Recent Attacks Mean for OT Network Security?

Security management can be proactive or reactive depending on each organization’s risk appetite. When attacks are made public, things change, and learning from threats becomes a requirement for both C-suite members and security leaders. WannaCry, NotPetya and Industroyer are some of the most recently analyzed malware pieces. Apart from corporate networ
Publish At:2017-09-27 22:46 | Read:261 | Comments:0 | Tags:Endpoint Energy & Utility Incident Response Network Critical

IBM Experts Weigh In on the Value of an Industry-Focused Approach to Security

To more closely align with the way clients think about security, IBM Security is focused on providing an open security immune system that enables organizations to integrate and leverage the investments they have already made within their specific industry. Experts Discuss the Benefits of an Industry-Focused Security Strategy We consulted six experts from the
Publish At:2017-08-30 20:10 | Read:366 | Comments:0 | Tags:Industries Automotive Industry Cloud Cloud Security Energy a

IDaaS Vendors: IBM Cloud Identity Service Named Market Leader in Six Recent Analyst Reports

Not one, not two, but six of the most recent analyst reports evaluating the major Identity and Access Management-as-a-Service (IDaaS) vendors positioned IBM Cloud Identity Service as an overall market leader in cloud-based identity and access management (IAM). The market is crowded with both startups and large IDaaS vendors, making this is a big win for IBM
Publish At:2017-08-16 09:00 | Read:266 | Comments:0 | Tags:Cloud Security Identity & Access Security Services Cloud Ide

Pervasive Encryption Simplifies Mainframe Security

On July 17, IBM unveiled its z14 mainframe server, which combines the traditional mainframe hardware with new capabilities in areas such as cloud, cognitive, analytics, application management, blockchain, machine learning and more. Most importantly, z14 includes enhanced security features — namely, pervasive encryption — to help clients stay one step ahead
Publish At:2017-08-04 20:10 | Read:1034 | Comments:0 | Tags:Data Protection Mainframe Application Security Encryption En

Accelerate Response With Orchestration

Organizations today are battling three compounding challenges: complex cyberattacks that shift as they unfold, complicated technology environments and a fast-growing skills gap. As a result, technologies and processes that enable a dynamic, fast and orchestrated response are becoming vital. IBM Resilient has many enterprise deployments around the world spa
Publish At:2017-07-28 03:30 | Read:321 | Comments:0 | Tags:Incident Response IBM IBM Security Incident Response (IR) Re

Hello, My Name Is Space Rogue

IBM X-Force Red marked its first-year anniversary with the addition of security specialists, including Space Rogue, who increases the team’s impressive roster of talent. Hello, my name is Space Rogue. Well, actually, it’s Cris Thomas, but the security community is most likely to recognize my work over the past two decades under my pseudonym. The
Publish At:2017-07-28 03:30 | Read:450 | Comments:0 | Tags:Application Security Security Services X-Force Research IBM

IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas

Earlier this year, I gave a talk at the RSA Conference about the privacy and security flaws in many of today’s connected cars. The response was nothing short of astounding. As it turns out, people get very nervous when you talk about finding and controlling their cars from a mobile phone. While I didn’t initially set out to find vulnerabilities i
Publish At:2017-07-24 17:25 | Read:247 | Comments:0 | Tags:Application Security Industries Software & App Vulnerabiliti

A ‘Wiper’ in Ransomware Clothing: Global Attacks Intended for Destruction Versus Financial Gain

Co-authored by Steve Stone After finalizing initial analysis, IBM X-Force Incident Response and Intelligence Services (IRIS) concluded that the Petya variant attacks that started on Tuesday, June 27, were intended as destructive attacks against Ukraine, rather than a means for cybercriminals to make money from ransom payouts. In other words, this attack was
Publish At:2017-06-30 03:45 | Read:420 | Comments:0 | Tags:Malware Advanced Attacks Advanced Malware Advanced Threats I

IBM Named a Leader in Inaugural Gartner Magic Quadrant for Access Management, Worldwide

Gartner has named IBM a Leader in its first-ever Magic Quadrant for Access Management, Worldwide. Both IBM Security Access Manager and Cloud Identity Service were evaluated in this new report, alongside 14 other vendors. IBM was placed as a Leader for completeness of vision and ability to execute. IBM Leads the Way in Access Management According to Gartne
Publish At:2017-06-29 09:20 | Read:480 | Comments:0 | Tags:Identity & Access Access Management Cloud Identity Service G

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud