HackDig : Dig high-quality web security articles for hackers

Companies complacent about data breach preparedness

The likelihood that companies will experience a security incident continue to rise every year. While most organizations have put a data breach preparedness plan in place to combat such incidents, most executives aren't updating or practicing the plan regularly, according to study released earlier this month."When it comes to managing a data breach, havin
Publish At:2016-10-28 18:25 | Read:4499 | Comments:0 | Tags:Security Disaster Recovery Backup and Recovery IT Strategy

ISF consulting services seek to strengthen cyber resilience

Aiming to help its members increase their cyber resilience, the Information Security Forum (ISF) today launched its global ISF Consultancy Services, focused on providing short-term, professional counsel to support the implementation of the non-profit association's resources and products."We're providing practical support to use the ISF tools either on a
Publish At:2016-09-21 02:00 | Read:3098 | Comments:0 | Tags:Cybersecurity Security IT Industry IT Strategy Data Protecti

Why a security team embraces shadow IT

When you hear the phrase "getting ahead of shadow IT," it typically comes from a CIO who is implementing new technologies so that employs won’t take it upon themselves to purchase tools. But you don't expect such proactive practices from an enterprise's information security team, which a CIO often enlists to place a moat around corporate assets.
Publish At:2016-08-18 14:00 | Read:5405 | Comments:0 | Tags:Security IT Industry Leadership and Management IT Strategy

U.S. senators want airline IT meltdowns to end

Two high-profile airline technology meltdowns stranding thousands of travelers in the recent weeks have prompted two US senators to push carriers to bolster their technology.Senators Richard Blumenthal (D-Conn.) and Edward J. Markey (D-Mass.)this week sent a letter to the most recent offenders -- Delta and Southwest -- as well as 11 other airline
Publish At:2016-08-17 01:20 | Read:4208 | Comments:0 | Tags:Security Data Center Mobile Networking IT Strategy

Businesses failing to secure privileged accounts

Most companies fail to secure the "keys to the kingdom," according to a new benchmark survey .Last week, privileged account management (PAM) specialist Thycotic and research firm Cybersecurity Ventures released their 2016 State of Privileged Account Management security report, based on the responses of more than 500 IT security professionals who
Publish At:2016-07-25 23:00 | Read:4031 | Comments:0 | Tags:Security Physical Security Windows Security IT Industry IT S

Security teams consulted too late on digital transformation

IT decision-makers who have responsibility for security believe security teams are brought in too late to have a meaningful effect on digital transformation initiatives, according to a new study.Dimensional Research, commissioned by by Dell, recently surveyed 631 IT decision-makers with responsibility for security from companies with 1,000 or mor
Publish At:2016-07-19 20:40 | Read:3923 | Comments:0 | Tags:Security CIO Role IT Industry IT Strategy

IDG Contributor Network: Cybersecurity - A view from the top

Maybe you have heard these words: “Cybercrime is big business.” Big business indeed. For the hackers that is. The 2016 Trustwave Global Security Report shows how hackers launching a malware infection campaign could expect to earn a breathtaking $84,100 in profit from an initial investment of just $5,900. This represents a return on investment of
Publish At:2016-07-19 20:40 | Read:3692 | Comments:0 | Tags:Security Cybersecurity C-Suite IT Strategy

Omni Hotels' new CIO shores up cybersecurity amid data breach

New Omni Hotels & Resorts CIO Ken Barnes is mulling how to shore up corporate defense in the wake of a cybersecurity attack that impacted 48 of its 60 hotels in North America. Barnes, who started in May, of course says he plans to improve the protection for Omni's payment processing systems. New defenses could include analytics that detect an
Publish At:2016-07-13 18:05 | Read:6717 | Comments:0 | Tags:Security CIO Role Cybersecurity IT Strategy Vertical Industr

Cisco aims to simplify security

Digital transformation. It's a reality that few companies today can escape. For some, the process is well underway. For many others, it's an oncoming inevitability. Whichever side of the gap your organization is on, you're probably facing a "security effectiveness gap" as the process brings more users, devices and applications online, creating an
Publish At:2016-07-12 05:35 | Read:3366 | Comments:0 | Tags:Security IT Industry IT Strategy Cloud Security Physical Sec

IDG Contributor Network: Beyond Acronyms: Humanizing Big Data and Information Governance through Mindful Storytelling

“Data governance applies to everything that we do,” shared Janice Haith, Department of Navy’s Deputy CIO. And, being responsible for complex, mission-critical initiatives such as enterprise architecture, software licensing, information assurance, data and help desk consolidation, and compliance, to name a few – means there is a lot of data to be dealt wi
Publish At:2016-06-23 23:00 | Read:3819 | Comments:0 | Tags:Big Data Data Center Hardware Security Storage Enterprise Ar

Security training programs don't do enough to mitigate insider risk

Employee-related security risks top the list of concerns for security professionals, but organizations aren't doing enough to prevent negligent employee behavior, according to a new study.Last month, security research firm Ponemon Institute, sponsored by Experian Data Breach Resolution, surveyed 601 individuals at companies with a data protection and pri
Publish At:2016-05-24 12:05 | Read:4165 | Comments:0 | Tags:Security Skills and Training Cloud Security Mobile Security

IDG Contributor Network: How to do more with less in IT

Many companies are striving to be more agile, efficient and productive in response to uncertain economic conditions in 2016.  Capital projects have been cancelled while companies shift their attention to surviving in the current environment without hindering their ability to expand in the future. Functional areas are facing significant pressure to cut co
Publish At:2016-03-01 15:30 | Read:4555 | Comments:0 | Tags:IT Strategy Cloud Computing Security

Defending against insider security threats hangs on trust

When it comes to security, insider threats are an unfortunate fact of life. But if you're thinking only about combatting malicious insiders, you may be miscalculating the risk."The insider threat is much broader," says Steve Durbin, managing director of the Information Security Forum (ISF), a nonprofit association that assesses security and risk manageme
Publish At:2016-01-23 05:10 | Read:3441 | Comments:0 | Tags:Security Compliance Physical Security Cloud Security Privacy

IDG Contributor Network: Cloud is now a core strategy — are you onboard?

What are clouds?That's a question a child might ask, but for CIOs today, the answer centers on a completely different meaning. Top tech chiefs and company executives are trying to figure out how to use cloud technology and to what degree it should be part of their company strategy.Without a doubt, statistics show the cloud can no longer be ignored:Accord
Publish At:2016-01-22 11:05 | Read:4023 | Comments:0 | Tags:Cloud Computing CIO Role Leadership and Management Security

5 biggest cybersecurity concerns facing CIOs, CISOs in 2016

Last year began and ended with a series of high-profile cybersecurity attacks, starting with the pilfering of 80 million Social Security records at health insurer Anthem and culminating with infiltrations at Starwood, Hilton and Hyatt hotel chains. Expect digital assaults, -- ranging from standard malware to more sophisticated, clandestine entries -- to
Publish At:2016-01-18 16:40 | Read:4170 | Comments:0 | Tags:Security CIO Role Cloud Security Mobile Security Physical Se

Announce

Share high-quality web security related articles with you:)

Tools