HackDig : Dig high-quality web security articles for hacker

A Road Map for Better Government Cybersecurity From North Dakota

Imagine the impact on the government cybersecurity landscape if the mantra for every U.S. state were something like, “Every student, every school, cyber-educated.” It’s the first I’ve heard about an objective this bold, and it comes from a state that gets little media exposure: North Dakota. The small Great Plains state has establishe
Publish At:2020-02-25 08:22 | Read:660 | Comments:0 | Tags:Government Artificial Intelligence (AI) Cybersecurity Jobs C

Will Weak Passwords Doom the Internet of Things (IoT)?

Weak passwords can hurt any organization’s security efforts and make any device easily hackable, but could they also be the greatest point of failure for internet of things (IoT) security? Weak passwords certainly put companies deploying IoT devices at greater risk of falling victim to a cyberattack. We have already begun to see attacks targeting IoT d
Publish At:2020-02-15 17:18 | Read:77 | Comments:0 | Tags:Endpoint Risk Management IoT Authentication Connected Device

Will the Future of Authentication Run Into a Privacy Wall?

Identity authentication is absolutely necessary to conducting our affairs today. Without it, we would lose virtually all confidence to conduct business or create and foster relationships. But with ever increasing concerns related to data privacy, it is worth looking at the past to see what future challenges we may face in the digital identity space. From Jew
Publish At:2019-10-18 10:20 | Read:635 | Comments:0 | Tags:Identity & Access Risk Management Artificial Intelligence (A

Current Trends in Identity and Access Management: July 2017

Identity and access management (IAM) is a mature and well understood domain of security. That doesn’t mean it’s static. While IAM is commonly associated with security — indeed, it is an essential part of a holistic security program — many people are beginning to understand the business processes it represents as well. They therefore view it as an
Publish At:2017-07-05 12:40 | Read:3662 | Comments:0 | Tags:CISO Cloud Security Identity & Access Security Intelligence

Reimagining the Future of Identity Management With Blockchain

Every business and social transaction is carried out by people. People are known by their identities. Hence, identity drives every business and social interaction. In today’s digital age, an individual’s identity is not defined by a single attribute such as a name, address or user ID. Rather, it is a collection of attributes including, but not li
Publish At:2017-03-08 04:55 | Read:5345 | Comments:0 | Tags:Identity & Access Blockchain Digital Identity identity Ident

How Can You Quantify the Value of Web Access Enforcement?

In the world of security, there is a constant struggle to justify spending, show business value and quantify positive impacts. But too often there is not enough funding, and security becomes important only after a crisis. The value of the identity and access management (IAM) domains is different because it doesn’t just address risk — it can lead to ope
Publish At:2016-12-14 13:10 | Read:5361 | Comments:0 | Tags:CISO Identity & Access Access Governance Access Management i

Explained: Doxing

Definition of Doxing (sometimes written as doxxing): gathering identifiable information about a person or a group of people with the objective to shame, scare, blackmail or bully the target. What is it? The technique as such was already known in the 1990’s when Usenet users researched and posted the real names belonging to online handles that they had an arg
Publish At:2016-02-15 13:00 | Read:4488 | Comments:0 | Tags:Online Security domain privacy dox doxbin doxing doxxing hav

Rethink the Personal Identity Ecosystem Using Digital Identification Documents

Personal Identity Instruments Today our personal identity is collected, captured and rendered by identity-issuing institutions. The plastic card is the common format used to convey that a trusted institution has certified your identity. However, we all know that this trust model is plagued with fraud issues. The most common personal identity instrument, the
Publish At:2016-01-23 10:50 | Read:4408 | Comments:0 | Tags:Identity & Access Digital Identity identity Identity Governa

How Can Access Management Platforms Improve Cloud Security?

Traditional enterprise access management is rooted on-premises. A centralized access management platform lets security administrators remove authentication and authorization logic from business applications, saving application developers time and increasing security by providing uniformity of access controls. That works well when employees and customers prim
Publish At:2015-11-04 15:25 | Read:3920 | Comments:0 | Tags:Cloud Security Identity & Access Access Management Cloud Clo

Elementary, My Dear Cognitive Identity Watson

A few days ago, IBM CEO Ginni Rometty announced the Cognitive Business initiative. This journey is supported by IBM Watson, the cognitive computing system that understands and learns from natural language. The name Watson is not an homage to Sherlock Holmes’ friend and assistant Dr. John Watson, but rather to Thomas J. Watson, IBM’s first CEO and
Publish At:2015-10-20 15:15 | Read:3432 | Comments:0 | Tags:Identity & Access identity Identity and Access Governance (I

How the way you type can shatter anonymity—even on Tor

Security researchers have refined a long-theoretical profiling technique into a highly practical attack that poses a threat to Tor users and anyone else who wants to shield their identity online.The technique collects user keystrokes as an individual enters usernames, passwords, and other data into a website. After a training session that typically takes
Publish At:2015-07-28 23:20 | Read:3414 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab anonymity beha

IAM: Proprietary Vs Cloud

IAM: Proprietary Vs Cloud Posted by Kevin on June 1, 2015.Wisegate will shortly publish the results of a survey into the current state of Identity and Access Management (IAM) maturity within business. Almost 150 CISOs took part. What we’re going to look at today is attitudes towa
Publish At:2015-06-02 05:20 | Read:3921 | Comments:0 | Tags:Insights Beanstalk CISO IAM identity verify Cloud

NSTIC – it will prove our identity but will it protect our privacy?

NSTIC – it will prove our identity but will it protect our privacy? Posted by Kevin on May 4, 2015.NSTIC, the National Strategy for Trusted Identities in Cyberspace, is an Obama initiative designed to make internet usage more secure for everyday users. It will do this by allowing third
Publish At:2015-05-04 12:30 | Read:4101 | Comments:0 | Tags:Insights identity NSTIC passwords privacy verify

Summary of Last Year's ICO Enforcement Action

PwC UK has published a summary of enforcement actions taken by the Information Commissioner's Office (ICO) in 2014.The Privacy and Security Enforcement Tracker 2014 summarises and comments on information originally published by the ICO on its web site concerning actions it has taken against organisations. This includes enforcement notices, monetary penalty n
Publish At:2015-04-28 06:00 | Read:3652 | Comments:0 | Tags:administrative privacy corrective identity data protection t

Governance and Consumer Identity Ride the Double-Decker at Gartner’s IAM Summit in London

As organizations grow and extend into new business models, so does the challenge of managing identities and access privileges. The Gartner IAM Summit, which was held from March 16 to March 17 in London, allowed customers and vendors alike to get together and discuss new advancements, challenges and trends in identity and access management (IAM). The conferen
Publish At:2015-03-28 01:00 | Read:3711 | Comments:0 | Tags:CISO Cloud Security Identity & Access Mobile Security authen


Share high-quality web security related articles with you:)


Tag Cloud