HackDig : Dig high-quality web security articles

Interpreting the Key Points of The 2022 IBM i Marketplace Survey Results

This year marks the eighth edition of the popular IBM i Marketplace Survey Results. Each year, HelpSystems collects data about how companies utilize the IBM i platform and the IT enterprises it helps. Year after year, the survey has started to demonstrate long-term directions that provide useful information about the future of this entrusted technology.Despi
Publish At:2022-08-16 01:43 | Read:94 | Comments:0 | Tags:IT Security and Data Protection IBM infrastructure Regulatio

Ransomware attack blamed for closure of all 7-Eleven stores in Denmark

Ransomware is to blame for the closure of all 175 7-Eleven stores in Denmark on Monday.The retailer closed all of its stores in Denmark after its cash registers and payment systems were brought down in the attack.Initially, 7-Eleven’s Danish division did not say that ransomware was responsible for its problems, simply describing the incident as a ̶
Publish At:2022-08-12 05:05 | Read:185 | Comments:0 | Tags:Featured Articles IT Security and Data Protection ransomware

Cyber Threats – The New Norm in Data Security

“Data: We have never had so much of it, and it has never been so challenging to protect.”These are some of the opening words in the new survey published by ISMG and HelpSystems in the ‘Data Security Survey 2022’. The survey explores how COVID19 has permanently changed how CISOs approach Data Security.It is an important study because it recognises that in a w
Publish At:2022-08-10 01:07 | Read:283 | Comments:0 | Tags:Featured Articles IT Security and Data Protection CISO data

Application Security Report 2022: Key Trends and Challenges

At a time when the state of cybersecurity is constantly changing, with new and increasing threats arising each day, it is vital for all organizations to keep it near the top of their list of priorities. Business applications are increasingly targeted by cybercriminals, and their ability to protect and defend themselves against these attacks is a crucial part
Publish At:2022-08-09 01:07 | Read:290 | Comments:0 | Tags:IT Security and Data Protection application security Key Cha

Is any organisation risk and data breach free?

I walked into a business the other day. After a long conversation about the client’s need for cybersecurity and the implementation of the ISO27001 security standard, we talked about their risk appetite.“We don’t accept any risk. We’re risk-averse” said the CEO. But, is this achievable?Given the complexity of our modern world, with div
Publish At:2022-07-27 01:06 | Read:424 | Comments:0 | Tags:Featured Articles IT Security and Data Protection

The State of Data Security in 2022: The CISOs Perspective

In the two years proceeding from the beginning of the COVID-19 pandemic, the business world has been transformed on a grand scale. Organizations have created more data than ever before, data is now spread across a wider attack surface, putting it at a heightened risk of becoming a compromised risk. The manner and location of data storage and correspondence h
Publish At:2022-07-26 01:06 | Read:394 | Comments:0 | Tags:Featured Articles IT Security and Data Protection C-Suite CI

Are your visuals making businesses more vulnerable to cybercrime?

In the world of modern business, companies must put extra effort into creating engaging visual content to stand out from the crowd. Social media marketing, for instance, was once deemed an easy way for companies to reach additional eyes but today, marketing is a lot more competitive than simply creating a post and hoping it goes viral.Entertaining short-form
Publish At:2022-07-19 01:06 | Read:410 | Comments:0 | Tags:Featured Articles IT Security and Data Protection business c

Defense in Depth to minimize the impact of ransomware attacks

Ransomware attacks continue to plague organizations globally regardless of their size. In a press release by the NCC group that preceded the Annual Threat Monitor Report 2021 published for the year 2021, there were an estimated 2,690 ransomware attacks, a 92.7% increase from 2020s figures of 1,389. The increase of ransomware attacks builds upon the general g
Publish At:2022-07-14 01:06 | Read:562 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Defense in

The True Cost of a Security Breach

There have been many articles about the cost of a security breach. With the emergence of privacy regulations that assign penalties based on a business’ profit, or those that calculate a value for each compromised record, it is possible to calculate the cost of a breach based on those metrics. However, it would seem that these hard numbers are not detailed en
Publish At:2022-07-06 01:06 | Read:626 | Comments:0 | Tags:IT Security and Data Protection cost data breach data securi

CISO Interview Series: The challenges of being the CISO for the University of Oxford.

The job of a CISO is one of constant change and unexpected challenges.  One of the most energetic environments to govern is that of a university. Universities function not only as academic institutions, but also as research hubs, hosting both curious students, as well as notable scholars.  This is an audience not known for slow-motion progress. The
Publish At:2022-07-04 01:06 | Read:627 | Comments:0 | Tags:Featured Articles IT Security and Data Protection CISO cyber

The Need of Privacy Certifications for Lawyers

The widespread adaptability and integration of tools and the professionals who can effectively use them to comply with the law will significantly impact the careers of both lawyers and other legal personnel. One of the fastest-growing areas in the legal profession in the United States is Privacy Law. Privacy certifications endorse attorneys as credentialed p
Publish At:2022-07-04 01:06 | Read:490 | Comments:0 | Tags:Featured Articles IT Security and Data Protection certificat

Black Basta ransomware – what you need to know

What is Black Basta?Black Basta is a relatively new family of ransomware, first discovered in April 2022.Although only active for the past couple of months, the Black Basta ransomware is thought to have already hit almost 50 organisations – first exfiltrating data from targeted companies, and then encrypting files on the firm’s computer systems.V
Publish At:2022-06-30 13:00 | Read:354 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cyberattac

Penetration Testing in 2022: Key Trends and Challenges

Just when you thought that we couldn’t be any more integrated with (and dependent on) technology, the Covid pandemic swooped in to prove otherwise. The rise in the use of applications and devices to perform even basic functions pushed companies and end-users to keep pace. Of course, one group of people always seem to be ready: cybercriminals.Cyber attacks ar
Publish At:2022-06-29 05:03 | Read:511 | Comments:0 | Tags:IT Security and Data Protection Core Security pen testing pe

Are Protection Payments the Future of Ransomware? How Businesses Can Protect Themselves

Ransomware has matured significantly over the previous decade or so. Initially thought to be a relatively basic virus that could be contained on a floppy disk, it can now damage global business infrastructures, stop healthcare systems dead in their tracks, mess with fuel supply networks, and disrupt transportation infrastructure.Its simplicity is what makes
Publish At:2022-06-28 01:06 | Read:628 | Comments:0 | Tags:Featured Articles IT Security and Data Protection payment ra

Q1 2022 Phishing Threat Trends and Intelligence Report

In 2022, phishing attacks have not only increased substantially, but they have also taken a new turn of events. According to the Agari and PhishLabs Quarterly Threat Trends & Intelligence report, phishing attacks are gradually being delivered through a wide range of online platforms.  The classic email phishing attack technique has increased slightl
Publish At:2022-06-21 02:14 | Read:687 | Comments:0 | Tags:Featured Articles IT Security and Data Protection intelligen


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud