HackDig : Dig high-quality web security articles for hacker

How Humans "LEAD" the Way to More Effective Use of Threat Intelligence

When the theme, Human Element, was announced for RSA Conference 2020 (RSAC), I was gratified. It’s a topic I never tire of because not only do I believe that there is no “silver bullet” technology, I believe it’s the humans who really lead the way to greater security efficiency and effectiveness. So, while at the conference I took the opportunity to view eve
Publish At:2020-04-02 20:02 | Read:134 | Comments:0 | Tags:INDUSTRY INSIGHTS Incident Response

Remaining Nimble During Times of Rapid Change

There is an adage that goes, "the only constant is change." And that has never been more true than right now, as organizations are having to rapidly adapt to current world events at an unprecedented pace. And traditionally, the aspect of networks that have had the hardest time adjusting to such rapid change has been security. This is especially true now
Publish At:2020-04-02 12:27 | Read:44 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security

Remote Work is Not New, but it is the New Normal

Working from home has been my personal norm for several years. Because I live too far from the office and regularly attend conference calls across different time zones than mine, commuting daily would be impractical. For me, being a remote worker is ideal and ensures that I can balance work and home life successfully.Due to Coronavirus (COVID-19) outbreak, h
Publish At:2020-04-02 08:39 | Read:65 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security

Keeping Your Security Strategy on Track Amidst Tactical Distractions

“Goodbye to Rosie, the queen of Corona” - Paul Simon, Me and Julio Down by the SchoolyardFor obvious reasons, the Coronavirus (COVID-19) has dominated news cycles, concerned governments, and inundated public health organizations. In addition to these organizations and many others, information security teams find themselves quite busy dealing with this p
Publish At:2020-04-01 17:29 | Read:88 | Comments:0 | Tags:INDUSTRY INSIGHTS Management & Strategy

Retooling Cyber Ranges

Cloud-based Cyber Ranges Will Change the Future of Training and Certifying Security and DevOps ProfessionalsA half-decade ago, with much fanfare, cyber ranges were touted as a revolutionary pivot for cybersecurity professionals’ training. Many promises and investments were made, yet the revolution has been slow coming. What may have been a slow start appears
Publish At:2020-03-31 07:20 | Read:95 | Comments:0 | Tags:INDUSTRY INSIGHTS Incident Response Training & Certifica

How to Address the Surging Need for Secure Remote Access to OT Networks

Strategies for Evaluating Secure Remote Access Solutions for OT/ICS NetworksOver the past decade, the number of employees in the U.S. working from home half-time or more has risen to an estimated five million, according to Global Workplace Analytics. However, those numbers now pale in comparison to today’s reality of businesses everywhere encouraging as many
Publish At:2020-03-24 12:13 | Read:194 | Comments:0 | Tags:INDUSTRY INSIGHTS SCADA / ICS

The Human Element and Beyond: Why Static Passwords Aren't Enough

Static Passwords Are No Longer Enough to Secure SystemsWhile there have been varying views about the decision to host RSA Conference 2020 in San Francisco despite the onset of Coronavirus infections, which has evolved into the COVID-19 pandemic, one thing organizers got right this year was the theme: The Human Element. This year marks the first time since 19
Publish At:2020-03-18 12:04 | Read:216 | Comments:0 | Tags:INDUSTRY INSIGHTS Identity & Access

There Are Plenty of Phish in the Sea

There Are Plenty of Phish in the Sea for Commercial Phishers and Weekend Scammers AlikeThe phish market is open. And you don’t have to be an experienced angler to land a catch of the day.Not that long ago, in order to successfully scam someone online, you needed to have at least a modicum of digital savvy. Newbies and less talented scammers tended to leave b
Publish At:2020-03-16 14:33 | Read:197 | Comments:0 | Tags:INDUSTRY INSIGHTS Phishing Cybercrime

Human Intelligence is Pivotal in a Data-Driven World

It's Important to Enrich External Threat Intelligence With Context to Understand the Who, What, Where, When, Why and How of an AttackIn cybersecurity, we tend to focus on technology to solve all our challenges and sometimes lose sight of the importance of people. For four years now I’ve talked about empowering the human element, a theme which was showcased a
Publish At:2020-03-11 07:41 | Read:270 | Comments:0 | Tags:INDUSTRY INSIGHTS Security Infrastructure Management & S

Never a Dull Moment - RSA Conference Afterthoughts

There's Never a Dull Moment in the World of Security After the disruption caused by the last-minute cancellation of Mobile World Congress, there were some mutterings as to whether RSA Conference 2020 (RSAC) would still happen. The media were suspicious and several sponsors withdrew in the weeks preceding the event. Nonetheless, the RSA bandwagon continu
Publish At:2020-03-10 16:30 | Read:295 | Comments:0 | Tags:INDUSTRY INSIGHTS Management & Strategy

Scouting the Adversary: Network Sensor Placement Considerations

Proper Network Sensor Placement Helps Security Analysts Focus on Events That MatterWhether you are fighting a real battle or a cyber battle, having line of sight over the battlefield can mean the difference between victory or defeat. Past readers of this column will already know the importance of gaining and maintaining terrain visibility, which is perhaps t
Publish At:2020-03-04 11:30 | Read:234 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security Security Infrastructure

The OT Security Opportunity for CISOs

In my previous column, I talked about the rapidly changing geopolitical landscape and the escalation of cyberattacks on critical infrastructure. Some of you may be wondering: “Why should I care? Russia and other nation-states aren’t focused on me and my networks.”If you’re a CISO at an insurance company or a medical facility or any organization where these n
Publish At:2020-03-03 13:47 | Read:146 | Comments:0 | Tags:INDUSTRY INSIGHTS SCADA / ICS

Advancing DevSecOps Into the Future

If DevOps represents the union of people, process, and technology to continually provide value to customers, then DevSecOps represents the fusion of value and security provided to those same customers. The philosophy of integrating security practices within DevOps is obviously sensible (and necessary), but by attaching a different label perhaps we are likely
Publish At:2020-03-03 09:59 | Read:206 | Comments:0 | Tags:INDUSTRY INSIGHTS Application Security

Spotting a Norman: How to Root Out Those Wasting Organizational Resources

In the 2016 film “Norman: The Moderate Rise and Tragic Fall of a New York Fixer”, Norman, the lead character, appears to be a successful businessman on the surface. Only after we begin to dig deeper do we learn that Norman is essentially more a complexly woven web of lies and inconsistencies than he is a real person. In other words, Norman is not at all as h
Publish At:2020-02-27 08:35 | Read:316 | Comments:0 | Tags:INDUSTRY INSIGHTS Management & Strategy

The Urgency for Having a True Security Platform

Ever since the birth of the Next-Generation Firewall, organizations have come to expect security devices that combine a variety of critical features and functions into a single package. To meet that demand, the number of security vendors referring to their offerings as a “platform” rather than an appliance, even if that platform only offers a handful of inde
Publish At:2020-02-27 08:35 | Read:197 | Comments:0 | Tags:INDUSTRY INSIGHTS Security Infrastructure


Share high-quality web security related articles with you:)


Tag Cloud