HackDig : Dig high-quality web security articles for hacker

Practice: The Best Defense for Responding to Cyber Incidents

First responders have proven time and time again the valuable help they provide to people in need. Right now, we’re seeing their bravery with the historic hurricanes, fires and floods impacting millions of people. What makes first responders confident in the face of such danger? One word: practice. And this lesson is translating to the private sector i
Publish At:2017-10-22 05:00 | Read:136 | Comments:0 | Tags:Banking & Financial Services Data Protection Incident Respon

How to Increase Transparency and Rebuild Trust After a Data Breach

As more companies suffer breaches and leak private data online, it becomes harder for organizations to be transparent and establish trust with their customers. Recent incidents have shown that many experts underestimated the total impact of a data breach in terms of the actual number of users affected and the volume of data made public. Many companies take t
Publish At:2017-10-22 05:00 | Read:140 | Comments:0 | Tags:Application Security Data Protection Incident Response Data

Sink or Swim: Uniting the C-Suite, Sales and Security to Fight Advanced Cyberattacks

One of the most disturbing security trends over the last few years has been the rise of the meta attack. The scope of this type of attack is far larger and wider than a threat designed to achieve a specific goal. These advanced cyberattacks are so significant, in fact, that they could sink an entire organization if it doesn’t take the time to install l
Publish At:2017-10-06 10:25 | Read:114 | Comments:0 | Tags:CISO Incident Response Risk Management Advanced Attacks Adva

Basic Security Tools You Cannot Afford to Miss in Your Risk Management Program

Risk management is the process of identifying, assessing and controlling threats to an organization. It is also a way to increase the security maturity of an organization. Risk management allows you to think about security more strategically and answer the questions that come from your company board, such as: How many times was the organization attacked? Is
Publish At:2017-10-03 08:40 | Read:274 | Comments:0 | Tags:CISO Incident Response Risk Management Incident Management I

What Do Recent Attacks Mean for OT Network Security?

Security management can be proactive or reactive depending on each organization’s risk appetite. When attacks are made public, things change, and learning from threats becomes a requirement for both C-suite members and security leaders. WannaCry, NotPetya and Industroyer are some of the most recently analyzed malware pieces. Apart from corporate networ
Publish At:2017-09-27 22:46 | Read:175 | Comments:0 | Tags:Endpoint Energy & Utility Incident Response Network Critical

Worried About Apache Struts? Stay One Step Ahead of Endpoint Attacks

Endpoint attacks can come from any direction and many sources. Just consider the reported vulnerabilities found in Apache Struts and the damage caused by WannaCry and Petya. Companies need to stay one step ahead of endpoint attacks, but they struggle due to a lack of visibility of endpoint status, the complexity of investigations and ineffective remediation.
Publish At:2017-09-25 15:30 | Read:156 | Comments:0 | Tags:Endpoint Incident Response Apache Endpoint Management Endpoi

When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law

In recent years, several high-profile breaches involving customer data have led to long and costly litigations. These events demonstrated that data protection is more than just a cybersecurity concern. When responding to a data breach, legal teams have to work closely with the chief information security officer (CISO) to ensure that security policies, r
Publish At:2017-09-21 19:15 | Read:63 | Comments:0 | Tags:CISO Incident Response Chief Information Security Officer (C

Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise

Indicators of compromise (IoCs) are artifacts such as file hashes, domain names or IP addresses that indicate intrusion attempts or other malicious behavior. These indicators consist of: Observables — measurable events or stateful properties; and Indicators — observables with context, such as time range. IoCs are crucial for sharing threat information and
Publish At:2017-09-18 17:25 | Read:164 | Comments:0 | Tags:Fraud Protection Incident Response Cyberattacks Incident Res

Equifax- or the new gold standard for “how not to do Incident Response”!

The cybersecurity expert Stuart Peck, Director of Cyber Security Strategy, ZeroDayLab, shared its view on the Equifax data breach. For those of you living under a rock this week, Equifax suffered a major breach in their security, which led to over 143 million records being stolen by attackers. The information held by Equifax is highly sensitive, especially f
Publish At:2017-09-16 11:05 | Read:232 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Hacking Cybercrime Equ

What Do Avocados and Threat Intelligence Have in Common?

Full disclosure: I would not eat guacamole for years because a certain puppet-centric movie I saw as a child had me convinced that it was actually made of frog brains. Once in college, however, seeing guacamole being made completely changed my opinion — unlike a sausage-making demonstration in a rather unfortunate public speaking class that same year of coll
Publish At:2017-09-13 08:20 | Read:236 | Comments:0 | Tags:Incident Response Threat Intelligence IBM X-Force Exchange I

Operational Integrity and Incident Response for IoT Security

Given the increasing volume of connected devices throughout society, Internet of Things (IoT) security should be a key consideration for businesses and consumers alike. Embedded in everything from our homes and cars to commercial and industrial manufacturing, IoT solutions are already providing significant benefits. As a result, IDC expects organizations to
Publish At:2017-09-06 20:40 | Read:215 | Comments:0 | Tags:Incident Response Cognitive Security Incident Response (IR)

Know Your Data and Your Enemies: Establishing a Baseline for Proactive Threat Hunting

The purveyors of modern threats are not trying to simply deface your website or own your web server. These advanced attackers are attempting to siphon critical and sensitive data from your network over long periods of time, and do so undetected. Where Is Your Data? When threat hunting, at a minimum, you should know where your critical data is stored and how
Publish At:2017-09-06 20:40 | Read:302 | Comments:0 | Tags:Data Protection Incident Response Risk Management Security I

Seven Steps to Improve Your Security Operations and Response

It’s hard to escape the reality that every day, cyberthreats morph and expand, escalating the need to improve and tighten security operations and response practices. While it may feel overwhelming, there are ways to help level the playing field. Cognitive computing and machine learning are new technologies that can empower security practitioners to foc
Publish At:2017-09-05 09:35 | Read:165 | Comments:0 | Tags:CISO Cognitive Endpoint Incident Response Security Intellige

Using a Free Online Malware Analysis Sandbox to Dig Into Malicious Code

The continuous advancement and sophistication of cyberthreats has gradually decreased the sufficiency of traditional gateway and endpoint security solutions for protection against malware. These approaches were sufficient when malware occurred in small numbers and it was easy to differentiate between good and bad applications. Nowadays, there’s a world
Publish At:2017-08-28 12:55 | Read:270 | Comments:0 | Tags:Incident Response Malware Malware Analysis Sandbox Sandboxin

Incident Response and Threat Intelligence: A Potent One-Two Punch to Fight Cybercrime

Cybercriminals and their tactics are becoming increasingly sophisticated. Given the rash of widespread, devastating attacks thus far in 2017, this trend shows no signs of slowing down. It’s no longer enough to simply implement incident response solutions. Today’s threats require a dedicated team of security experts to maximize these tools with
Publish At:2017-08-17 19:00 | Read:204 | Comments:0 | Tags:Incident Response Security Services Threat Intelligence Adva

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud