HackDig : Dig high-quality web security articles for hacker

Securing Autonomous Vehicles Paves the Way for Smart Cities

As homes, workplaces, and cities digitally transform during our Fourth Industrial Revolution, many of those charged with securing this digital future can find it difficult to “level up” from the endpoints and focus on defining and solving the larger problem sets. It is easy to get bogged down in the myriad of smart and smart-enough devices that constitute “I
Publish At:2019-11-14 22:15 | Read:39 | Comments:0 | Tags:INDUSTRY INSIGHTS IoT Security

Navigating a Way Out of the Lion's Den Before, During, and After Incident Response

In my previous column, I offered tips on leveraging security metrics in order to stay out of the lion’s den. It goes without saying that it’s always best to avoid the lion’s den whenever possible. In fact, much of the security advice out there is centered around this philosophy.  But what should one do if they have no choice but to put themselves in the
Publish At:2019-11-13 22:15 | Read:83 | Comments:0 | Tags:INDUSTRY INSIGHTS Incident Response

You Can't Defend What You Can't See: Why Visibility is Critical for Improving Cyber Defense

Real-time Visibility Into the Security Posture of an Enterprise is Critical for Organizations to Operate With ConfidenceThe proliferation of connected devices coupled with today’s vanishing perimeter and ever-changing threat landscape complicate an already complex environment for organizations to secure against today’s sophisticated adversaries. Attacks orig
Publish At:2019-11-12 10:15 | Read:53 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security

What Security Trends Are You Thankful For?

Did you know that Thanksgiving is not only celebrated in the United States but in seven other countries around the world? One popular tradition is to take time during the Thanksgiving dinner to share something you’re thankful for. As the holiday approaches, I thought I’d take the opportunity to share three things I believe every security professional can giv
Publish At:2019-11-11 22:15 | Read:6 | Comments:0 | Tags:INDUSTRY INSIGHTS Management & Strategy

Digital Transformation in Pharma Introduces New OT Security Threats

The increased use of automated control systems to manage drug formulations and product quality (particularly for combination drugs) is creating new security risks for the pharmaceutical industry. Examples of this new vulnerability surfaced in June 2017 when the pharmaceutical sector, along with healthcare and many other industries, were targeted by the
Publish At:2019-10-29 12:00 | Read:504 | Comments:0 | Tags:INDUSTRY INSIGHTS SCADA / ICS

Clean Up Your Act with Better Cyber Hygiene

Basic Cyber Hygiene is Lakcking and Now is the Time to Make it RoutineA good quality control (QC) consultant is great at focusing on core principles. Want to prioritize your biggest problems? Build a Pareto chart. Want to engage in continuous quality improvement? Follow the “plan, do, check, adjust” formula.In cybersecurity, numerous surveys have already plo
Publish At:2019-10-29 10:15 | Read:364 | Comments:0 | Tags:INDUSTRY INSIGHTS Risk Management

5G Myth Busting: Unpacking the Cybersecurity Risks and Realities

When 5G was formally announced in 2018, it came with promises of changing the face of wireless connectivity – those promises are finally being realized. Around the world, wireless carriers are switching on functionality and, in both the U.S. and the UK, all major vendors have enabled it. But for now, 5G is only available in major urban areas, such as London,
Publish At:2019-10-23 22:15 | Read:342 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security

Tips for Leveraging Security Metrics

My previous column on security metrics seemed to generate quite a bit of interest.  This tells me that metrics is a topic that, while challenging, is also important and at the top of the priority list for security organizations.An unfortunate, though timely news story brings me an apt analogy for this week’s piece.  A few weeks back, a woman e
Publish At:2019-10-23 12:00 | Read:250 | Comments:0 | Tags:INDUSTRY INSIGHTS Risk Management

Gaining a Decisive Advantage in the Cyber Battle

One the most significant challenges facing cybersecurity professionals today is the need to simplify and consolidate their existing cybersecurity infrastructure. This is a trend that I saw time and time again over my 33-year career at the National Security Agency (NSA) and USCYBERCOM. In my senior technical roles there, I was responsible for driving major in
Publish At:2019-10-22 22:15 | Read:236 | Comments:0 | Tags:INDUSTRY INSIGHTS Risk Management Management & Strategy

Best Practices for Evaluating and Vetting Third Parties

The global and interconnected nature of business today means that no company or organization is an island. Every modern business relies on many others, either as part of the supply or distribution chain, or for value-added services like accounting and social media marketing. But employing a third party adds risk, especially if that company is given some
Publish At:2019-10-21 10:15 | Read:289 | Comments:0 | Tags:INDUSTRY INSIGHTS Risk Management

True Awareness for National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month (NCSAM) and an opportune time to remind every organization of the importance of “awareness” to their cybersecurity programs. I fully realize you’re already well-aware of the relentless stream of global cyberattacks against organizations and individuals every day. And we all know that security teams are d
Publish At:2019-10-17 12:00 | Read:178 | Comments:0 | Tags:INDUSTRY INSIGHTS Incident Response Risk Management

Securing All Cloud Deployments With a Single Strategy

Many organizations eager to reap the benefits of cloud networking have adopted a cloud first strategy. As a result, their DevOps teams are actively developing applications that enable them to compete more effectively in today’s digital marketplace. Cost savings, agility, responsiveness and scalability are all drivers of this growing transition. Developing or
Publish At:2019-10-15 12:00 | Read:198 | Comments:0 | Tags:INDUSTRY INSIGHTS Cloud Security Cloud

Why All Security Disciplines Should Use the Intelligence Cycle

The intelligence cycle is often underutilized in nearly every area of security. This iterative process through which data or information becomes intelligence can streamline, focus, and provide strategic guidance in myriad situations that extend far beyond the realm of traditional intelligence operations. But despite these benefits, in most cases (at least in
Publish At:2019-10-14 12:00 | Read:301 | Comments:0 | Tags:INDUSTRY INSIGHTS Incident Response Risk Management

How Blockchain Will Solve Some of IoT's Biggest Security Problems

Blockchain Can Protect Systems and Devices While Supporting IoT Devices that Have Few Security DefensesWhile blockchain has its place in the world of cryptocurrency, the growing list of industries considering blockchain initiatives is growing fast including healthcare, telecommunications, energy and even manufacturing.The reason? Data integrity.Blockchain is
Publish At:2019-10-09 12:00 | Read:274 | Comments:0 | Tags:INDUSTRY INSIGHTS IoT Security

Cloud is Creating Security and Network Convergence

Network Security Expertise is Needed More Than Ever Inside Security Operations Centers and on DevOps TeamsDigital transformation forces many changes to a business as it migrates to the public cloud. One of the most poorly examined is the convergence of network and security administration tasks and responsibilities in the public cloud.On premises, the divisi
Publish At:2019-10-08 12:00 | Read:249 | Comments:0 | Tags:INDUSTRY INSIGHTS Cloud Security Cloud

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud