HackDig : Dig high-quality web security articles for hackers

3 Ways Effective OT Security Enables Your Business

OT Networks Are Often a Black Box for Security Teams and Don’t Have the Telemetry to See and Monitor Industrial EnvironmentsEvery company in the world relies on operational technology (OT) networks. For nearly half of the Fortune 2000 – in industries including oil and gas, energy, utilities, manufacturing, pharmaceuticals, and food and beverage – these netwo
Publish At:2020-05-28 17:07 | Read:95 | Comments:0 | Tags:INDUSTRY INSIGHTS SCADA / ICS

Protecting Online Retail in the Face of COVID-19 and Beyond

For as much buzz as there is in recent times around the impending death of brick-and-mortar retail, the move to online shopping is not new. The first transactions occurred in the 1960s with IBM mainframe applications, which sped up processes such as airline ticket reservations and sales. However, these were custom applications. Online shopping as we know it
Publish At:2020-05-24 07:52 | Read:80 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security

Realizing the Potential of AI-Driven Security Operations

Managing security is an increasingly complicated task for a number of reason. First, networks are expanding rapidly, and many organizations have found that their visibility across the network has been significantly reduced. Siloed security tools and isolated network development and security projects have resulted in vendor sprawl, which means more management
Publish At:2020-05-24 07:51 | Read:94 | Comments:0 | Tags:INDUSTRY INSIGHTS Incident Response

Why You May Not Need to Monitor the Dark Web

In recent years, the “Dark Web” has become mainstream. In the past, this collection of forums, chat rooms, marketplaces and tools populated by cybercriminals and other types of threat actors, used to be known mainly to law enforcement agents, security professionals and fraud teams, who were responsible of protecting organizations from the threats that emanat
Publish At:2020-05-18 13:57 | Read:238 | Comments:0 | Tags:INDUSTRY INSIGHTS Cybercrime

Three Tips to Help CISOs Close the IT-OT Security Gap

Advice for CISOs on Bridging the IT-OT Security Gap: Part 1In my two previous articles I talked about how industrial networks have become the latest geopolitical battleground and why CISOs should care. Now, I’m going to provide three actionable recommendations to bridge the IT-Operational Technology (OT) security gap, including common pitfalls from the field
Publish At:2020-04-14 14:50 | Read:373 | Comments:0 | Tags:INDUSTRY INSIGHTS SCADA / ICS

Why You Need to Put Your Security to the Test

We’re all familiar with the expression ‘Trust but verify.’ Unfortunately, when it relates to protecting their networks, most organizations rely on trust but don’t verify that their security solutions are working as they should. A recent survey (PDF) of security operations effectiveness found that just 37 percent of security professionals have hard evidence t
Publish At:2020-04-13 12:05 | Read:352 | Comments:0 | Tags:INDUSTRY INSIGHTS Security Architecture Security Infrastruct

Attacking the Organism: Telecom Service Providers

Securing the Massive Netwoks of Telecom Service Providers is a Major Challenge and Becoming More ComplexService providers and telecom carriers form the backbone of communications and commerce in modern economies. Their networks and cell towers deliver the internet itself—and everything that depends on it—to homes, businesses and mobile devices all over the w
Publish At:2020-04-08 14:04 | Read:529 | Comments:0 | Tags:INDUSTRY INSIGHTS Mobile Security Wireless Security Mobile &

How Humans "LEAD" the Way to More Effective Use of Threat Intelligence

When the theme, Human Element, was announced for RSA Conference 2020 (RSAC), I was gratified. It’s a topic I never tire of because not only do I believe that there is no “silver bullet” technology, I believe it’s the humans who really lead the way to greater security efficiency and effectiveness. So, while at the conference I took the opportunity to view eve
Publish At:2020-04-02 20:02 | Read:425 | Comments:0 | Tags:INDUSTRY INSIGHTS Incident Response

Remaining Nimble During Times of Rapid Change

There is an adage that goes, "the only constant is change." And that has never been more true than right now, as organizations are having to rapidly adapt to current world events at an unprecedented pace. And traditionally, the aspect of networks that have had the hardest time adjusting to such rapid change has been security. This is especially true now
Publish At:2020-04-02 12:27 | Read:314 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security

Remote Work is Not New, but it is the New Normal

Working from home has been my personal norm for several years. Because I live too far from the office and regularly attend conference calls across different time zones than mine, commuting daily would be impractical. For me, being a remote worker is ideal and ensures that I can balance work and home life successfully.Due to Coronavirus (COVID-19) outbreak, h
Publish At:2020-04-02 08:39 | Read:298 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security

Keeping Your Security Strategy on Track Amidst Tactical Distractions

“Goodbye to Rosie, the queen of Corona” - Paul Simon, Me and Julio Down by the SchoolyardFor obvious reasons, the Coronavirus (COVID-19) has dominated news cycles, concerned governments, and inundated public health organizations. In addition to these organizations and many others, information security teams find themselves quite busy dealing with this p
Publish At:2020-04-01 17:29 | Read:237 | Comments:0 | Tags:INDUSTRY INSIGHTS Management & Strategy

Retooling Cyber Ranges

Cloud-based Cyber Ranges Will Change the Future of Training and Certifying Security and DevOps ProfessionalsA half-decade ago, with much fanfare, cyber ranges were touted as a revolutionary pivot for cybersecurity professionals’ training. Many promises and investments were made, yet the revolution has been slow coming. What may have been a slow start appears
Publish At:2020-03-31 07:20 | Read:246 | Comments:0 | Tags:INDUSTRY INSIGHTS Incident Response Training & Certifica

How to Address the Surging Need for Secure Remote Access to OT Networks

Strategies for Evaluating Secure Remote Access Solutions for OT/ICS NetworksOver the past decade, the number of employees in the U.S. working from home half-time or more has risen to an estimated five million, according to Global Workplace Analytics. However, those numbers now pale in comparison to today’s reality of businesses everywhere encouraging as many
Publish At:2020-03-24 12:13 | Read:323 | Comments:0 | Tags:INDUSTRY INSIGHTS SCADA / ICS

The Human Element and Beyond: Why Static Passwords Aren't Enough

Static Passwords Are No Longer Enough to Secure SystemsWhile there have been varying views about the decision to host RSA Conference 2020 in San Francisco despite the onset of Coronavirus infections, which has evolved into the COVID-19 pandemic, one thing organizers got right this year was the theme: The Human Element. This year marks the first time since 19
Publish At:2020-03-18 12:04 | Read:364 | Comments:0 | Tags:INDUSTRY INSIGHTS Identity & Access

There Are Plenty of Phish in the Sea

There Are Plenty of Phish in the Sea for Commercial Phishers and Weekend Scammers AlikeThe phish market is open. And you don’t have to be an experienced angler to land a catch of the day.Not that long ago, in order to successfully scam someone online, you needed to have at least a modicum of digital savvy. Newbies and less talented scammers tended to leave b
Publish At:2020-03-16 14:33 | Read:451 | Comments:0 | Tags:INDUSTRY INSIGHTS Phishing Cybercrime


Share high-quality web security related articles with you:)


Tag Cloud