HackDig : Dig high-quality web security articles for hackers

Tech groups push policy priorities for the Trump administration

Technology trade groups are already pushing out their policy priorities for President-elect Donald Trump's administration, even though his campaign rarely touched on IT issues.With Silicon Valley largely opposed to Trump during the campaign and his tech policy agenda paper thin, policy recommendations from tech trade groups may be an exercise in wishful
Publish At:2016-11-10 18:10 | Read:4681 | Comments:0 | Tags:IT Industry Government Legal Security

President Trump: An uncertain future for tech industry, digital rights

U.S. President-elect Donald Trump's vision for the country's economy-driving technology industry is largely a blank canvas, and when he's dipped his toe into IT issues, he's made people nervous.Trump's campaign was dominated by debates over illegal immigration, lost manufacturing jobs, and character issues. Silicon Valley firms largely opposed Trump, and
Publish At:2016-11-09 23:50 | Read:4525 | Comments:0 | Tags:IT Industry Security Government

AI makes security systems more flexible

Advances in machine learning are making security systems easier to train and more flexible in dealing with changing conditions, but not all use cases are benefitting at the same rate.Machine learning, and artificial intelligence, has been getting a lot of attention lately and there's a lot of justified excitement about the technology.One of the side effe
Publish At:2016-11-08 11:10 | Read:8262 | Comments:0 | Tags:Network Security Security Data Protection IT Industry Emergi

4 ways Cognizant customers can protect themselves amid corruption probe

Following Cognizant’s announcement late last week that it had launched an internal investigation into possible anti-corruption violations, there have been more questions than answers about what may have occurred at the Teaneck, N.J.-headquartered provider of offshore IT services. Particularly perplexing to some was the attendant news that the company’s l
Publish At:2016-10-07 19:55 | Read:4342 | Comments:0 | Tags:Outsourcing Security Leadership and Management IT Industry

Business transformation proves to be a catalyst for cybersecurity spending

As enterprises accelerate their use of cloud computing, online services, and ready themselves for internet of things deployments, they are finding themselves strained to find the cybersecurity talent and security tools needed to secure these efforts. That’s one of the most important takeaways from the Global State of Information Security Survey (GSISS) 2
Publish At:2016-10-06 07:25 | Read:4837 | Comments:0 | Tags:Leadership and Management Security IT Industry Cloud Computi

ISF consulting services seek to strengthen cyber resilience

Aiming to help its members increase their cyber resilience, the Information Security Forum (ISF) today launched its global ISF Consultancy Services, focused on providing short-term, professional counsel to support the implementation of the non-profit association's resources and products."We're providing practical support to use the ISF tools either on a
Publish At:2016-09-21 02:00 | Read:3498 | Comments:0 | Tags:Cybersecurity Security IT Industry IT Strategy Data Protecti

Why a security team embraces shadow IT

When you hear the phrase "getting ahead of shadow IT," it typically comes from a CIO who is implementing new technologies so that employs won’t take it upon themselves to purchase tools. But you don't expect such proactive practices from an enterprise's information security team, which a CIO often enlists to place a moat around corporate assets.
Publish At:2016-08-18 14:00 | Read:5937 | Comments:0 | Tags:Security IT Industry Leadership and Management IT Strategy

Do no harm: an oath for health IT developers

As health professionals, nurses, doctors, and even pharmacists are held to a high standard of making sure everything they do is above board. They can lose license for failing to comply with ethical guidelines. Even though software engineers in health IT have a far greater reaching impact on patients, no equivalent code of conduct exists for devel
Publish At:2016-08-01 19:30 | Read:4543 | Comments:0 | Tags:Security Developer IT Industry Health Healthcare

Businesses failing to secure privileged accounts

Most companies fail to secure the "keys to the kingdom," according to a new benchmark survey .Last week, privileged account management (PAM) specialist Thycotic and research firm Cybersecurity Ventures released their 2016 State of Privileged Account Management security report, based on the responses of more than 500 IT security professionals who
Publish At:2016-07-25 23:00 | Read:4533 | Comments:0 | Tags:Security Physical Security Windows Security IT Industry IT S

Security teams consulted too late on digital transformation

IT decision-makers who have responsibility for security believe security teams are brought in too late to have a meaningful effect on digital transformation initiatives, according to a new study.Dimensional Research, commissioned by by Dell, recently surveyed 631 IT decision-makers with responsibility for security from companies with 1,000 or mor
Publish At:2016-07-19 20:40 | Read:4366 | Comments:0 | Tags:Security CIO Role IT Industry IT Strategy

$29.99 for the IT Security & Ethical Hacking Certification Training ($1,895 value) - Deal Alert

If you’re looking to enter a rapidly growing field, snag this course bundle in IT Security & Ethical Hacking. Instructors walk you through training for three industry-recognized certification exams:CompTIA Security+Cisco’s CCNA SecurityCertified Ethical HackerFor a limited time, the bundle of courses is only $29.99--a steal considering it’s j
Publish At:2016-07-15 06:55 | Read:3437 | Comments:0 | Tags:Hacking Security IT Industry Education Careers/Staffing

Cisco aims to simplify security

Digital transformation. It's a reality that few companies today can escape. For some, the process is well underway. For many others, it's an oncoming inevitability. Whichever side of the gap your organization is on, you're probably facing a "security effectiveness gap" as the process brings more users, devices and applications online, creating an
Publish At:2016-07-12 05:35 | Read:3864 | Comments:0 | Tags:Security IT Industry IT Strategy Cloud Security Physical Sec

Why you shouldn't pay the ransomware fee

While most of the decision makers would likely prefer to hear a simple yes or no when asking if they should pay, nothing in security is simple. By and large, the position of many leaders in the industry is that the ideal situation is not to pay.Security experts across the industry would like to see all enterprises, large and small, be prepared fo
Publish At:2016-07-11 11:20 | Read:3248 | Comments:0 | Tags:Backup and Recovery Data Protection Cybersecurity IT Industr

Is your car secure? Maybe not, but enterprise users can still learn something

If you're looking for a good lesson in enterprise security, there might be a few sitting in the parking lot. The automotive field is a glaring example of "worst practices" in security, say several automotive experts. And, the problem is only getting worse, not better.Over the past few years, the cars have come under fire for many things -- consta
Publish At:2016-07-05 09:20 | Read:4250 | Comments:0 | Tags:IT Industry Car Tech Security

Human error biggest risk to health IT

In the race to digitize the healthcare industry, providers, insurers and others in the multi-layered ecosystem have failed to take some of the most basic steps to protect consumers' sensitive health information, a senior government official is warning.Servio Medina, acting COO at the Defense Health Agency's policy branch, cautioned during a recent presen
Publish At:2016-06-03 09:20 | Read:4574 | Comments:0 | Tags:Security Health IT Industry Healthcare Cybersecurity Governm


Tag Cloud