HackDig : Dig high-quality web security articles

Looking for Cyber Insurance? Know Your Eligibility

Before leaving on an extended (and expensive) vacation, I bought travel insurance. I wanted to protect myself in case I or my traveling partner tested positive for COVID-19. I had to answer a number of questions about my eligibility for such insurance before they would approve me. Nor did the insurance come cheap, but I wanted to protect myself and recover
Publish At:2022-06-16 10:19 | Read:752 | Comments:0 | Tags:Data Protection cyber insurance COVID-19 Identity Identity M

Instagram verification services: What are the dangers?

Instagram, like other social platforms, has a verification system for high profile accounts. A verified badge means Instagram has confirmed that the account is the authentic presence of a public figure, celebrity or brand. Have you ever wanted to get your own account verified? We noticed a large number of Instagram accounts all claiming to offer this as a
Publish At:2022-05-24 12:59 | Read:621 | Comments:0 | Tags:Scams checkmark identity Instagram media services social med

7 Holiday Cybersecurity Tips to Try Before The Year Ends

The holiday rush is upon us, and so is the risk of cyberattack. Threat actors often get to work during the holidays. IT staff is heading out for vacation, and everyone is in a hurry. This means we might skimp on security. Still, there are some holiday cybersecurity tips that will help make the season go smoothly.    End of Year and Christmas
Publish At:2021-12-06 14:02 | Read:3129 | Comments:0 | Tags:Data Protection Fraud Protection Identity & Access Incident

Using Vendor Management to Defend Against Supply Chain Attacks

Supply chain attacks are growing more common. According to the Identity Theft Resource Center (ITRC), there were just 19 supply chain attacks in the final quarter of 2020. In the following quarter, that volume grew to 27 attacks — an increase of 42%. Those incidents in Q1 2021 affected 137 U.S. groups and a total of seven million people. Why are the
Publish At:2021-09-30 15:27 | Read:3629 | Comments:0 | Tags:Incident Response Risk Management Security Services supply c

6 Benefits of Using Privileged Access Management

When you think of access, passwords are likely the first thing that pops into your head. While passwords are a large and important part of managing access, there are other aspects to consider as well. Using the full spectrum offered by Privileged Access Management (PAM) can help. It’s easy to focus on the glitzier sides of cybersecurity. However, if y
Publish At:2021-09-17 10:30 | Read:1779 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Intelligenc

ID theft ghouls targeting Surfside victims is appalling, but no surprise

We’ve written at length about account compromise and identity theft, and how criminals will often hijack accounts belonging to dead people. In many ways, it’s the perfect crime for anyone indulging in social engineering. The amount of abandoned accounts due to death can only ever go up, and nobody is really paying attention if someone accesses them illici
Publish At:2021-07-21 13:09 | Read:4108 | Comments:0 | Tags:Privacy data breach dead death disaster id fraud identity le

The False Identity Frenzy and the Need for Authentication

Emil Sayegh, president and CEO of Ntirety, unpacks the issue of inauthentic identities opening doors to untraceable, fake social accounts and the impact that it has on society. Emil is a cloud visionary and is known as one of the “fathers of OpenStack.”Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com
Publish At:2021-07-12 04:59 | Read:2616 | Comments:0 | Tags:Podcast Authentication identity identity and access manageme

Your May 2021 Security Intelligence Roundup: The DarkSide Ransomware Attack, Better Zoom Meetings, and How To Secure OpT

Gas shortages caused panic after the Colonial Pipeline attack two weeks ago. This highlights how digital attacks can break into the real world in a big way. Specifically, the Colonial Pipeline attack blends crypto-locking data with data exfiltration and extortion, as well as other threats to infrastructure. How did the attackers do it, and what makes them d
Publish At:2021-05-27 10:45 | Read:1634 | Comments:0 | Tags:Security Intelligence & Analytics CISO Risk Management Secur

Synthetic Identity Theft: When Everybody Knows Your Name

You probably have a place where everyone knows your name — and maybe your address and your birthday and your favorite drink. That place could be your favorite restaurant, your office or your grandma’s house. It doesn’t matter where that place is; when everyone in the room greets you by name, it gives you a warm feeling inside, knowing this
Publish At:2021-05-11 23:31 | Read:1738 | Comments:0 | Tags:Banking & Finance Data Protection Fraud Protection Identity

Consent Management: Picking the Right CIAM Strategy

Practically everything consumers do online — shopping, paying bills and signing up for new services — requires some level of personal data sharing or changing privacy settings. Consumers need to feel that your organization’s digital experiences are worth trusting and that their data will be used for only its intended purpose and kept safe.
Publish At:2021-03-25 20:57 | Read:2194 | Comments:0 | Tags:Identity & Access Security Intelligence & Analytics Access M

Solving 5 Challenges of Contact Tracing Apps

Contact tracing apps are designed to help public health agencies connect the dots by linking confirmed carriers of novel coronavirus to recent, close-proximity interactions. In theory, this creates a protective safety net — a way for countries to manage the spread and mitigate the impact of COVID-19 at scale. Despite good intentions, the push for thir
Publish At:2021-02-16 11:53 | Read:2320 | Comments:0 | Tags:Application Security Data Protection Mobile Security Advance

How to Make Personalized Marketing Effective With Consumer Identity Programs

Everyone is fighting for the attention of potential customers. It’s the work you’ve done; the creative energy expended by your team; and the amount of time your group spent just to get the right people to visit your website or mobile app. After all that sweat and toil, you don’t want to lose your customers to a high-profile security breach
Publish At:2021-01-05 17:35 | Read:1931 | Comments:0 | Tags:Identity & Access Identity Identity and Access Management (I

How Can Enterprises Protect Personally Identifiable Information?

With data breaches often appearing in the news, customers and enterprise leaders alike may be concerned that the enterprise isn’t doing enough to protect customers’ personally identifiable infomation (PII). As today’s chaotic economy makes for a hungry threat landscape, what methods can the enterprise apply to better protect the increased
Publish At:2020-08-24 10:26 | Read:2784 | Comments:0 | Tags:Data Protection Identity & Access Risk Management Data Breac

Questions to Ask When Conducting Single Sign-On Enrollment

Instead of asking employees to input passwords every day, single sign-on (SSO) offers a simplified but secure authentication process. SSO authentication gives a user the option of choosing a single set of credentials to access multiple accounts and services. So, how can organizations best use SSO for their purposes? This authentication scheme works with the
Publish At:2020-08-11 10:36 | Read:2256 | Comments:0 | Tags:Identity & Access Email Identity Identity and Access Managem

How Zero Trust Will Change Your Security Design Approach

As a security architect within IBM Security Services, I often get asked the question, “What exactly is a Zero Trust architecture?” Well, there is no single or unique answer to that question for two reasons. First, Zero Trust is not an architectural model but rather a set of guiding principles that should be applied to existing and new designs. W
Publish At:2020-06-04 08:30 | Read:2639 | Comments:0 | Tags:Security Services Zero Trust Access Management Enterprise Se

Announce

Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud