HackDig : Dig high-quality web security articles for hacker

When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law

In recent years, several high-profile breaches involving customer data have led to long and costly litigations. These events demonstrated that data protection is more than just a cybersecurity concern. When responding to a data breach, legal teams have to work closely with the chief information security officer (CISO) to ensure that security policies, r
Publish At:2017-09-21 19:15 | Read:42 | Comments:0 | Tags:CISO Incident Response Chief Information Security Officer (C

Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise

Indicators of compromise (IoCs) are artifacts such as file hashes, domain names or IP addresses that indicate intrusion attempts or other malicious behavior. These indicators consist of: Observables — measurable events or stateful properties; and Indicators — observables with context, such as time range. IoCs are crucial for sharing threat information and
Publish At:2017-09-18 17:25 | Read:140 | Comments:0 | Tags:Fraud Protection Incident Response Cyberattacks Incident Res

The CISO’s Guide to Managing Insider Threats

Critical digital and physical assets are becoming increasingly vulnerable due to accelerated connectivity, differing global regulatory requirements, joint ventures and business partnerships and security weaknesses within complex multinational supply chains. These factors have led to a rise in insider threats for enterprises across all industries. An insider
Publish At:2017-09-11 19:25 | Read:145 | Comments:0 | Tags:CISO Data Protection Identity & Access Chief Information Sec

Is Your Company Secure by Design? Aligning Security With Business Objectives

The principle of security by design suggests that security needs to be aligned with business objectives. But what, exactly, does that mean and where should security professionals start? Below are some factors to consider when aligning security with business objectives. Best Practices for Aligning Security With Business Objectives First and foremost, give
Publish At:2017-09-07 15:10 | Read:185 | Comments:0 | Tags:Security Intelligence & Analytics Incident Response (IR) Ris

Operational Integrity and Incident Response for IoT Security

Given the increasing volume of connected devices throughout society, Internet of Things (IoT) security should be a key consideration for businesses and consumers alike. Embedded in everything from our homes and cars to commercial and industrial manufacturing, IoT solutions are already providing significant benefits. As a result, IDC expects organizations to
Publish At:2017-09-06 20:40 | Read:187 | Comments:0 | Tags:Incident Response Cognitive Security Incident Response (IR)

Know Your Data and Your Enemies: Establishing a Baseline for Proactive Threat Hunting

The purveyors of modern threats are not trying to simply deface your website or own your web server. These advanced attackers are attempting to siphon critical and sensitive data from your network over long periods of time, and do so undetected. Where Is Your Data? When threat hunting, at a minimum, you should know where your critical data is stored and how
Publish At:2017-09-06 20:40 | Read:197 | Comments:0 | Tags:Data Protection Incident Response Risk Management Security I

Seven Steps to Improve Your Security Operations and Response

It’s hard to escape the reality that every day, cyberthreats morph and expand, escalating the need to improve and tighten security operations and response practices. While it may feel overwhelming, there are ways to help level the playing field. Cognitive computing and machine learning are new technologies that can empower security practitioners to foc
Publish At:2017-09-05 09:35 | Read:148 | Comments:0 | Tags:CISO Cognitive Endpoint Incident Response Security Intellige

Analyze Attack Patterns to Make Your Environment Secure by Design

A great way to mitigate the effects of a cyber incident is to analyze attack patterns. This requires analysts to build a pattern up from a single security event, such as a command execution or malicious file download, into a collection of data that can help them trace and defend against an attack. To accomplish this level of analysis, security professionals
Publish At:2017-09-01 10:00 | Read:135 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Cognitive Securi

Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

Gone are the days of the Nigerian prince promising fortune to unsuspecting email recipients. Attackers have stepped up their phishing game and evolved their tactics to entice employees to click links or open attachments, preying on the opportunity to spread persistent malware or compromise credentials. These threat actors relentlessly target employees — both
Publish At:2017-08-24 16:50 | Read:99 | Comments:0 | Tags:Fraud Protection Security Intelligence & Analytics Employee

Incident Response and Threat Intelligence: A Potent One-Two Punch to Fight Cybercrime

Cybercriminals and their tactics are becoming increasingly sophisticated. Given the rash of widespread, devastating attacks thus far in 2017, this trend shows no signs of slowing down. It’s no longer enough to simply implement incident response solutions. Today’s threats require a dedicated team of security experts to maximize these tools with
Publish At:2017-08-17 19:00 | Read:170 | Comments:0 | Tags:Incident Response Security Services Threat Intelligence Adva

Not Enough Hours in the Day? Respond Faster With Automated, Intelligent Security Analytics

When you work in the cybersecurity industry, the skills shortage isn’t just a news topic — it’s a serious business challenge. How can security teams defend against cybercriminals and their ever-evolving attack techniques when they’re significantly outnumbered? How can they successfully dig through millions of events across dozens of point s
Publish At:2017-08-16 09:00 | Read:135 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Analytics Cognit

Testing Top Leadership’s Muscle Memory With Data Breach Simulations

How would your organization’s leadership fare in its response to a full-on data breach? Regular and ongoing training can improve top leaders’ ability to respond to a cybersecurity breach and avoid doing additional damage to the reputation of the company as they deal with the repercussions. Organizations simply cannot afford to be lax about their
Publish At:2017-08-14 16:55 | Read:273 | Comments:0 | Tags:CISO Incident Response C-Suite Data Breach Executives IBM X-

Why Red on Blue Is a Crucial Component of Cyber Skills and Incident Response Training

More and more companies are looking to cyber exercises and capture the flag events to improve their incident response effectiveness, upskill staff and tackle the cybersecurity talent gap. A red on blue experience provides a safe sandbox environment for participating companies to stress test their business processes and challenge their capabilities in respon
Publish At:2017-08-03 06:55 | Read:189 | Comments:0 | Tags:Incident Response Cybersecurity Jobs Cybersecurity Training

Make Attorney-Client Privilege Part of Your Incident Response Strategy

According to Forrester, business and technology leaders often dismiss lawyers as obstacles to productivity. Many security teams fail to fully engage legal with incident response planning because: Lawyers are often seen as risk-averse, disengaged advisors. It’s difficult to know whether you’re talking to the right lawyer. There is a widespread b
Publish At:2017-08-01 18:05 | Read:244 | Comments:0 | Tags:Incident Response Risk Management Incident Response (IR) reg

Accelerate Response With Orchestration

Organizations today are battling three compounding challenges: complex cyberattacks that shift as they unfold, complicated technology environments and a fast-growing skills gap. As a result, technologies and processes that enable a dynamic, fast and orchestrated response are becoming vital. IBM Resilient has many enterprise deployments around the world spa
Publish At:2017-07-28 03:30 | Read:253 | Comments:0 | Tags:Incident Response IBM IBM Security Incident Response (IR) Re

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud