HackDig : Dig high-quality web security articles for hacker

Five Key IT Security Best Practices to Safeguard Your Expanding Business

A key theme of the recent Cybersecurity Nexus event in Washington, D.C. was the growing need for small and medium-sized businesses (SMBs) to adopt enterprise-like IT security best practices. In fact, SMBs might actually have an edge over the unrelenting competition they endure from larger enterprises because they are more proactive and nimbler in mitigating
Publish At:2017-10-22 05:00 | Read:2976 | Comments:0 | Tags:Application Security Retail Risk Management Application Secu

Information Security, Cybersecurity, IT Security, Computer Security… What’s the Difference?

Information security, cybersecurity, IT security, and computer security are all terms that we often use interchangeably. I know that I do.I’ve written a lot about those areas for the past several years. I notice that sometimes I switch between the terms in an article simply to avoid repeating the same phrases over and over again in my prose.Very often,
Publish At:2017-03-08 04:10 | Read:3285 | Comments:0 | Tags:Featured Articles Off Topic computer security cybersecurity

Authoritative Asset Repository: What’s That?!

A Configuration Management Database (CMDB) is a repository that is an authoritative source of information of what assets are on the corporate network. At least, that’s what it’s supposed to be. However, in many of my recent discussions, the more common definition given for CMDB is “a struggle.” Does that sound familiar? If so, keep reading. If not, please sh
Publish At:2017-01-30 18:30 | Read:2744 | Comments:0 | Tags:IT Security and Data Protection IT Security Security Control

75 Percent of Orgs Can’t Effectively Detect and Respond to Data Breaches, Reveals Survey

Earlier this year, Tripwire commissioned Dimensional Research to ask 500 IT security professionals about their organizations’ key challenges in their cyber security and compliance programs. Tripwire’s 2016 Security Challenges Survey covered various areas of interest for infosec folks. For instance, it gauged respondents’ thoughts on the lack of trained
Publish At:2016-12-08 08:22 | Read:3401 | Comments:0 | Tags:Featured Articles IT Security and Data Protection breach inc

Amplify IT Security by Integrating Solutions

The lowly banana – it’s a great source of potassium. As a stand-alone food source, it’s rather boring. Mono-flavored (like a banana). It’s sometimes squishy or bruised or otherwise imperfect. And it’s often part of a dull breakfast routine (mine).But pair banana slices with bran cereal or as the basis for a smoothie, and your taste buds come alive. Let’s cal
Publish At:2016-12-02 05:00 | Read:3431 | Comments:0 | Tags:Featured Articles IT Security and Data Protection FIM integr

What the Cloud Can Do to Improve IT Security

Cloud computing has come a long way in just a few years. Now, most businesses use some sort of cloud service, whether it be for a specific software application, infrastructure requirements, or more. The cloud certainly represents the way many companies are choosing to operate, but some have shown reluctance to adopt cloud solutions.One of the major concerns
Publish At:2016-11-28 08:56 | Read:2619 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Cloud IT S

97% of Large Companies are Victims of Mass Data Breaches

Ashley Madison, Dropbox and Yahoo have something in common—they are all victims of mass data breaches where user log-in credentials were stolen. Sadly, this type of tactic has become more common over the last year. What’s even worse is that it seems like this will continue to be an objective for cybercriminals—after all, why wouldn’t they want access to mill
Publish At:2016-11-02 06:35 | Read:2311 | Comments:0 | Tags:Mobile News News data breach IT security Panda Security

Your First Aid to Cyber Extortion

Cyber extortion, contrary to some misconceptions, isn’t new. The fact is it’s a top IT security concern that’s been targeting susceptible enterprises for over four decades now.Here’s some background information. Bank of America was the first to be on the receiving end of the threat in 1971. Since then, it has become a thriving business for
Publish At:2016-11-01 00:45 | Read:3463 | Comments:0 | Tags:Cyber Security Featured Articles cyber extortion data DDoS I

Computer Crime Never Pays, and These 5 Stories Prove It

It’s no secret that some computer crime can generate a lot of money. For example, the author of Cerber ransomware relies on an affiliate system to distribute their creation. The malware developer collects only a fraction of the ransom payments, the average value of which usually amounts to around one Bitcoin. But even with just 0.3 percent of victims p
Publish At:2016-10-17 04:35 | Read:3144 | Comments:0 | Tags:Featured Articles Government Cerber computer crime hack IT S

Change Management: The Foundation to Your Organization’s IT Security

What is the first question you ask when something goes wrong in your environment? A system goes down? Service isn’t performing as it should? You flip the switch but nothing happens?In November of 1988, something happened that forever changed IT security and exponentially increased the need to ask this question. That is when the Morris worm was first distribu
Publish At:2016-10-11 01:55 | Read:4330 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Change FIM

A Three-Pronged Strategy to Help Organizations Defend Against Ransomware Attacks

In acknowledgment of National Cyber Security Awareness Month (NCSAM) 2016, we at The State of Security weighed in on how organizations can leverage the right people, processes and technology to defend themselves against common IT security threats. We covered a variety of risks, including POS malware, browser vulnerabilities and stolen IT assets.Noticeably ab
Publish At:2016-10-05 18:05 | Read:1821 | Comments:0 | Tags:Cyber Security Featured Articles data IT Security NCSAM Phis

Worldwide “Crysis” Through Remote Desktop Protocol

Two weeks ago we saw a ransomware attack in a server belonging to a French company. It was a Crysis variant, a ransomware family that appeared earlier this year. We witness thousands of infection attempts by ransomware on a daily basis, but this one caught our attention as the file somehow showed up in the computer when no one was supposed to be using it an
Publish At:2016-09-23 06:55 | Read:2270 | Comments:0 | Tags:Malware Mobile News IT security PandaLabs Ransomware

Five Tell-Tale Signs of a Compromised Website

Everyone has done it at least once – entered the wrong URL when trying to visit a website. Maybe instead of “google.com” you fat-fingered “google.cm,” Google’s main search page for Cameroon. No big deal there, and we hear the scenery there is lovely.But sometimes a tiny mistake can result in big problems. Entering a URL that’s o
Publish At:2016-09-21 06:55 | Read:6016 | Comments:0 | Tags:Featured Articles Security Awareness data IT Security Privac

10 Best Practices In IT Security Management Automation

In my last blog post, I introduced the topic of automation and how it can help improve security posture. In this post, we’ll be covering some of the risks automation can mitigate against.Data Breaches and Cyber AttacksA recent survey by ISACA on organization preparedness indicated that only 38% of businesses were confident they were prepared to respond to a
Publish At:2016-09-16 17:10 | Read:2449 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cyber atta

Is Your IT Security and Risk Management Strategy Getting the Job Done?

IT decision makers have a very difficult job. They are often asked to make technology decisions on subjects for which they may only have cursory knowledge. Then when things go wrong, they are responsible for dealing with the fallout of those decisions.It’s one thing to make a mistake when deciding on something relatively trivial, like picking out what kind o
Publish At:2016-08-18 00:35 | Read:1750 | Comments:0 | Tags:Featured Articles IT Security and Data Protection IT Securit

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud