HackDig : Dig high-quality web security articles for hackers

Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges

Every chief information security officer (CISO) faces ongoing threats to his or her company’s assets. While some threats apply to every industry, IT security specialists in the health care, financial services, and energy and utilities sectors need to pay more attention to industry-specific security risks. Although these threats are most prevalent in th
Publish At:2017-09-26 09:56 | Read:3941 | Comments:0 | Tags:Banking & Financial Services CISO Energy & Utility Health Ca

IBM Experts Weigh In on the Value of an Industry-Focused Approach to Security

To more closely align with the way clients think about security, IBM Security is focused on providing an open security immune system that enables organizations to integrate and leverage the investments they have already made within their specific industry. Experts Discuss the Benefits of an Industry-Focused Security Strategy We consulted six experts from the
Publish At:2017-08-30 20:10 | Read:6286 | Comments:0 | Tags:Industries Automotive Industry Cloud Cloud Security Energy a

IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas

Earlier this year, I gave a talk at the RSA Conference about the privacy and security flaws in many of today’s connected cars. The response was nothing short of astounding. As it turns out, people get very nervous when you talk about finding and controlling their cars from a mobile phone. While I didn’t initially set out to find vulnerabilities i
Publish At:2017-07-24 17:25 | Read:4514 | Comments:0 | Tags:Application Security Industries Software & App Vulnerabiliti

Multipronged IoT Security to Help Realize the Value of IoT Solutions

The Internet of Things (IoT) is an exciting and innovative technology that can help businesses discover new growth areas and income streams. With all this innovation to differentiate in industry verticals and challenge traditional operating models, it’s easy to overlook IoT security, both in terms of its uniqueness and its importance. What Is Different
Publish At:2017-07-24 17:25 | Read:5575 | Comments:0 | Tags:Application Security CISO Cognitive Industries X-Force Resea

Information and Communication Technology (ICT) Industry: Second-Most Attacked Sector in 2016

The information and communication technology (ICT) industry has evolved greatly over the last several decades. The interconnected nature of ICT devices and systems, along with modern society’s dependence on the technologies and services this sector provides, increases the risk of cyberattack. Furthermore, firms in this industry often act as a clearingh
Publish At:2017-07-10 21:30 | Read:5483 | Comments:0 | Tags:Industries Threat Intelligence X-Force Research Buffer Overf

Manufacturing Security Incidents: Forty Percent Higher Than Cross-Industry Average in 2016

The manufacturing industry — including, but not limited to, automotive, electronics, food and beverage, textile and pharmaceutical companies — was the third most attacked sector in 2016, according to the 2017 IBM X-Force Threat Intelligence Index. In fact, the number of security incidents, which are attacks or security events reviewed by IBM security analyst
Publish At:2017-06-06 08:50 | Read:4860 | Comments:0 | Tags:Advanced Threats Industries Threat Intelligence IBM X-Force

How IoT Data Analytics Will Give Businesses a Competitive Edge

According to McKinsey & Company, the potential economic impact of the IoT could reach $11 trillion per year in 2025, which is equivalent to around 11 percent of the world economy. Making that a reality will depend on the widespread use of Internet of Things (IoT) data analytics. Security analysts must ensure that devices are not just managed and monito
Publish At:2017-04-25 12:21 | Read:5266 | Comments:0 | Tags:Data Protection Endpoint Industries Analytics Big Data Big D

IoT Security: Who Is Stepping Up?

The Internet of Things (IoT) is creating huge opportunities for businesses and society at large. Experts expect 30 billion connected devices to generate a market size of $1.7 trillion by 2020, according to an IDC infographic. With all this opportunity at risk, it is reasonable to ask why industry leaders haven’t done more to address the ever-increasing
Publish At:2017-01-04 09:35 | Read:5218 | Comments:0 | Tags:Application Security Government and Federal Industries Conne

In 2017, Blockchain Gets Serious

When I became Global Blockchain Lead for Security Services at IBM in January 2016, I had no idea what kind of year awaited me. Just a few highlights: In February, IBM introduced developer services on the Bluemix cloud to enable rapid creation and monitoring of blockchain applications. In April, IBM launched a new set of highly secure blockchain services on
Publish At:2016-11-28 09:40 | Read:6814 | Comments:0 | Tags:Banking & Financial Services Industries Banking Bitcoin Bloc

How Blockchain Ledger Technology Is Coming of Age

Most people know alternative currencies such as bitcoin make use of a distributed transaction ledger technology called blockchain. But what isn’t well-known is how numerous businesses are investing heavily in blockchains for noncurrency applications. Blockchain Technology Poised to Grow Last month, the Linux Foundation announced a major new initiative
Publish At:2016-01-29 11:30 | Read:5207 | Comments:0 | Tags:Banking & Financial Services Industries Security Intelligenc

Loco Motives? Hacker Attacks Could Derail Train Cybersecurity, Researchers Say

It’s hard to argue with efficiency in tech or transportation. Despite the availability of air freight and commercial trucking services, trains stand out as both efficient and cost-effective when it comes to moving large quantities of material goods. According to SecurityWeek, however, the supervisory control and data acquisition network (SCADA) systems
Publish At:2016-01-12 21:40 | Read:4800 | Comments:0 | Tags:Advanced Threats Industries Cyberattacks Cybercrime Energy a

Manufacturing Security: Managing Machines in Motion

The manufacturing industry — including, but not limited to, automotive, electronics, food and beverage, textile and pharmaceutical companies — depends on production processes running at optimum efficiency to satisfy market demand. What happens when these processes are altered unintentionally or maliciously? The consequences could range from financial loss du
Publish At:2016-01-06 21:00 | Read:3725 | Comments:0 | Tags:Industries Infrastructure Protection Cybersecurity Industria

Connected Cars: Safe to Drive, Safe to Own

A modern car is a wonderful piece of engineering. Even at its most basic, these vehicles provide levels of road holding, economy, safety and comfort that make their predecessors of only a decade ago seem like tractors in comparison. While a modern car’s performance is miles ahead of its forebears, manufacturers know that they cannot rest on their laure
Publish At:2015-09-17 14:25 | Read:4119 | Comments:0 | Tags:Industries Software & App Vulnerabilities Automobile Industr

The Importance of Building an Information Security Strategic Plan

Some say that strategic planning is no longer practical or necessary in today’s rapidly changing technical environment, but strategy still remains an essential part of defining clear companywide goals and how to achieve them. Strategic planning is about setting long-term goals, establishing the directions and constraints that will guide the tactical ac
Publish At:2015-07-08 20:05 | Read:3135 | Comments:0 | Tags:Industries Risk Management Compliance Information Management

For Data Security, Catering to the Business Will Be Essential

My two-year-old daughter already knows how to use my phone to play with apps. I did not teach her how to do this, so as I watch in awe, I cannot help but think about how the improvement of security products will now address the transitions we expect in the future. Until recently, security products were geared toward a unique type of person who was technical,
Publish At:2015-03-20 00:35 | Read:3776 | Comments:0 | Tags:Data Protection Industries Chief Risk Officer (CRO) Cybersec


Tag Cloud