HackDig : Dig high-quality web security articles for hacker

Five years later, Heartbleed vulnerability still unpatched

The Heartbleed vulnerability was introduced into the OpenSSL crypto library in 2012. It was discovered and fixed in 2014, yet today—five years later—there are still unpatched systems.  This article will provide IT teams with the necessary information to decide whether or not to apply the Heartbleed vulnerability fix. However, we caution: The latter c
Publish At:2019-09-20 11:20 | Read:175 | Comments:0 | Tags:Exploits and vulnerabilities cryptography EKs exploit kits e

10 Must-Read Books for Information Security Professionals

There are many ways for IT professionals to broaden their knowledge of information security. Attending infosec conferences, for instance, provides personnel with an opportunity to complete in-person trainings and network with like-minded individuals. Outside of industry events, analysts can pick up a book that explores a specific topic of information securit
Publish At:2017-03-16 18:05 | Read:4566 | Comments:0 | Tags:Off Topic books Information Security IT

4 Best Practices for Improving Your Organization’s Supply Chain Security

Digital attackers have many different strategies for infiltrating a target organization. That even goes for companies with robust perimeter defenses. Bad actors simply need to find a soft target they can exploit. Oftentimes, they find what they’re looking for along a target’s supply chain.We can best understand the supply chain as a network of pe
Publish At:2017-03-15 05:05 | Read:2501 | Comments:0 | Tags:Featured Articles IT Security and Data Protection IT supply

More than 90% of IT Pros Expect More Attacks, Risk, and Vulnerability with IIoT in 2017

The Internet of Things (IoT) embodies great promise and risk. On the one hand, ordinary users view IoT as a means of streamlining their activities across billions of “smart” devices. They hope such connectivity will ultimately translate into better and easier lives. On the other hand, IoT devices aren’t always designed with security in mind
Publish At:2017-03-13 16:15 | Read:3177 | Comments:0 | Tags:Featured Articles ICS Security IIoT IT OT Vulnerability

International Women’s Day: 8 empowered woman in the computing world

8 empowered woman in the computing world to celebrate International Women’s Day Often seen as a male-dominated industry, women have played an important part in driving developments in the computer industry. As we celebrate International Women’s Day, these eight women have blazed a trail in IT, setting an example to us all. Ada Lovelace Despite being th
Publish At:2017-03-07 21:20 | Read:2499 | Comments:0 | Tags:Mobile Security News cybersecurity Hackers It

68% of Oil and Gas Organizations Have Suffered a Digital Attack, Reveals Report

A new report reveals that 68 percent of oil and gas organizations have experienced at least one digital attack.In the Siemens-sponsored The State of Cybersecurity in the Oil & Gas Industry: United States (PDF), Ponemeon Institute surveyed 377 individuals based in the United States who are responsible for overseeing digital risk to their organization̵
Publish At:2017-02-27 10:30 | Read:3411 | Comments:0 | Tags:Latest Security News ics IT OT

4 Tips for a Successful OT & IT Security Marriage

Securing critical infrastructure is becoming a priority for the public and private sectors. Cyber professionals everywhere are rejoicing about the increasing investments in protecting the networks and systems that keep us safe at night. The Oval Office has even signaled its intentions to make security a priority.We welcome the new administration’s desire for
Publish At:2017-02-15 03:15 | Read:4723 | Comments:0 | Tags:Featured Articles ICS Security IT OT security

Integrating IT and OT: Design Challenges in Critical Infrastructure Security

Will you be attending the 2017 RSA conference this month? Do you like information technology (IT)? Do you like operational technology (OT)? Do you like critical infrastructure and security? If you answered yes to any of these questions, then I’d love to meet you at my Learning Lab session at RSA 2017 where I’ll be facilitating discussions about the design ch
Publish At:2017-02-07 10:45 | Read:2998 | Comments:0 | Tags:Off Topic cybersecurity IT RSA 2017

Do You Buy, Build, or Partner for Cyber Security Capability?

“Do you buy, build, or partner for cyber security capability” This is a question a lot of MSPs and IT providers are looking a right now. It’s no secret that according to the CompTIA data (see below chart), the Cyber Security discussion with businesses will be a hot topic worldwide.Another interesting number from CompTIA is that 79% of businesses
Publish At:2016-12-02 05:00 | Read:3616 | Comments:0 | Tags:Cyber Security Featured Articles CompTIA IT MSP

Women in Information Security: Jess Dodson

Women in information security are a fascinating group of people. I should know, being one myself. But being female in a quickly growing male-dominated industry poses its own challenges. And those of us who pursue security and IT in spite of gender stereotypes have unique strengths and insight.I first interviewed Tiberius Hefflin, a Scottish security analyst
Publish At:2016-11-23 18:20 | Read:3648 | Comments:0 | Tags:Off Topic Information Security IT sysadmin women

Women in Information Security: Kat Sweet

Women are vital to the information security field, but there are relatively few of us. Speaking to women in our industry gleams insights about how we’ve ended up in that male dominated field and perhaps how to attract more of us.I first interviewed Tiberius Hefflin, a Scottish security analyst who’s working in the United States. Then I spoke to T
Publish At:2016-11-17 14:50 | Read:2798 | Comments:0 | Tags:Off Topic Information Security IT Network Security women

Understand and Managing Change: Why We Shouldn’t Rely on the Human Element

At some point in our lives, we have all experienced a time when we had something break, quit working, or at the very least not work the way we expected. After exhausting our personal skills in trying to figure out how to fix the problem, we end up calling the repairman – the expert that will help us get back on track.In the IT Ops and IT Security worlds, the
Publish At:2016-11-12 22:57 | Read:2659 | Comments:0 | Tags:Featured Articles Security Configuration Management Change I

Women in Information Security: Tiberius Hefflin

Information security is the fastest growing area of IT. It affects more people in more ways than ever before. It affects not only our public records, our utilities, our white-collar work, and our entertainment. Now that we carry small computers in our pockets and in our cars, talk of the Internet of Things (IoT) is also starting to become reality. That’
Publish At:2016-10-24 09:05 | Read:2662 | Comments:0 | Tags:Off Topic computer science Information Security Internet of

Why Is Endpoint Protection a Big Deal in ICS Environments?

In a previous blog post, ICS: Next Frontier For Cyber Attacks blog, I spoke about the cybersecurity posture of industrial control systems (ICS) and the enormous implications for such attacks. For industrial organizations, it means downtime and lost business. For individuals, it means potential safety issues and lost services. For society, it means significan
Publish At:2016-09-28 21:40 | Read:3404 | Comments:0 | Tags:Featured Articles ICS Security Belden ics IT Network OT secu

The Benefits of Sharing Information for IT and Security

Confidentiality, Integrity and Availability – those are the three pillars of the CIA triad model for information security.Here’s something you might not have known: in reverse order, those same pillars apply to IT Operations. Think about it. In a world of agility and enablement, the availability, integrity and confidentiality of the systems and process
Publish At:2016-09-13 16:10 | Read:3338 | Comments:0 | Tags:IT Security and Data Protection Availability CIA Confidentia


Share high-quality web security related articles with you:)


Tag Cloud