HackDig : Dig high-quality web security articles for hacker

Effective Data Security Begins With a Strong Tech Foundation

Data is the engine of the modern economy. Whether it consists of customer data, intellectual property, market insights or financial information, these types of sensitive data enable the most successful businesses to thrive. It’s no surprise, then, that securing that critical data is increasingly a strategic priority for organizations around the globe.
Publish At:2020-03-31 08:26 | Read:108 | Comments:0 | Tags:CISO Data Protection Chief Information Officer (CIO) Chief I

Infosec Education: What are the “right” credentials?

Well, the infosec community has done it again. We’ve gotten good and riled about something, with (maybe) good reason. In case you’ve been under a rock, here’s the breakdown: Equifax suffered a massive breach of consumer credit data (started in May 2017 and was announced in September). The CIO and CSO resigned from the company in the wake o
Publish At:2017-09-20 14:20 | Read:2449 | Comments:0 | Tags:Information Security

Where are the “Actionable Defense” talks?

This year, for the first time, I did not make it to DEF CON, B-Sides Las Vegas, Black Hat, etc. I was bummed, because this has been a yearly pilgrimage for a really long time for me, but too much work sandwiched on both sides of it. Naturally, I was thinking, “What did I miss?” Aside from seeing friends and getting up to shenanigans, of course. A
Publish At:2017-09-04 19:50 | Read:1953 | Comments:0 | Tags:Information Security

Building Upon Trump’s Executive Order on Cybersecurity

Just days after President Trump signed his executive order on cybersecurity, the massive WannaCry attack dominated the news cycle. The assault infiltrated 150 countries, penetrating national networks and infrastructure. A breach of such international scale has rightly raised questions about government preparedness for digital warfare. In answering these co
Publish At:2017-06-09 10:30 | Read:5182 | Comments:0 | Tags:Government Cybersecurity Cybersecurity Framework Federal Gov

Information Security in the Age of Disinformation

Depending on their specific goals and motivations, malicious external actors seek to blackmail individuals, organizations or security vendors to disrupt breach defenses or otherwise wreak havoc on IT operations. For security leaders tasked with defending against these threats, it’s hard to know who or what to believe. That challenge has only gotten wor
Publish At:2017-06-03 00:15 | Read:4704 | Comments:0 | Tags:CISO Data Protection Chief Information Security Officer (CIS

100-Day Government IT Roundup: Immigration, Innovation and Information Security in Trump’s America

The first 100 days of President Trump’s term have come and gone, with the new leader tackling challenges such as health care, border protection and reinvigorating American business. But what about government IT? Cybersecurity and modernization were hot-button topics during the election, fueled in part by repeated breaches of private organizations by
Publish At:2017-05-14 01:10 | Read:4938 | Comments:0 | Tags:Government Cybercrime Cybersecurity Federal Government Feder

An Open Letter to Human Resources Teams

Every few years, it seems, the information security community has a renewed interest in, and debate over, the value of certifications, degrees, experience, etc. in helping information security professionals land jobs. Along with this renewed interest comes a spate of blog posts and articles that aim to help those new to the industry advance, and advice for v
Publish At:2017-03-28 15:20 | Read:4066 | Comments:0 | Tags:Information Security Musings

10 Must-Read Books for Information Security Professionals

There are many ways for IT professionals to broaden their knowledge of information security. Attending infosec conferences, for instance, provides personnel with an opportunity to complete in-person trainings and network with like-minded individuals. Outside of industry events, analysts can pick up a book that explores a specific topic of information securit
Publish At:2017-03-16 18:05 | Read:5350 | Comments:0 | Tags:Off Topic books Information Security IT

Closing the Skills Gap: Making the Case for a Blended Training/Education Approach

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself and, you will succumb in every battle.” –Sun Tzu, “Attack by Stratagem” #18 Art of WarCybersecurity media is awash with coverage
Publish At:2017-03-09 17:00 | Read:6219 | Comments:0 | Tags:Featured Articles Security Awareness Defense Information Sec

MITM-as-a-Service: The Threat Surface We Didn’t Know We Had

This past week, as most security professionals know by now, a severe bug was discovered in the Cloudflare content delivery network’s service by noted researcher Tavis Ormandy. Organizations should pay attention when Tavis reaches out, just like they should when Brian Krebs reaches out – there’s a damn good reason, and it’s probably im
Publish At:2017-02-27 00:45 | Read:2808 | Comments:0 | Tags:Cloud Security Information Security

The Top 10 Cities for Information Security Professionals in 2017

A lack of skilled information security professionals poses a threat to most organizations. In Tripwire’s 2016 Security Challenge Survey – Skills Gap, 75 percent of IT security professionals said they don’t have enough skilled personnel to detect and respond to a breach. Almost the same percentage (66 percent) of respondents reported a dearth of t
Publish At:2017-02-24 08:30 | Read:4471 | Comments:0 | Tags:Off Topic Information Security jobs skills gap

GDPR and the DPO: Five Things to Know About Your Next Job Vacancy

If the GDPR (General Data Protection Regulation), the EU’s data protection harmonisation project, was to become Hollywood movie, its genre would most likely be horror.Focus on the regulation over the past twelve months has been mostly aimed toward its penalties, with scare stories in no short supply. The GDPR has been called many things; visionary, giv
Publish At:2017-02-23 14:05 | Read:4262 | Comments:0 | Tags:Featured Articles IT Security and Data Protection data GDPR

The More Infosec Changes, the More it Stays the Same

I took a full year off from blogging. It felt wonderful. Time to get back to being my ranty self, though, so I’m kicking off 2017 in style, at RSA in San Francisco. This will be a short post. It’s amazing to me, that in all this time in the industry, we have the exact same scenarios (in albeit different ways) that we did 10 years ago. Passwords e
Publish At:2017-02-14 17:30 | Read:3156 | Comments:0 | Tags:Information Security Musings

Is Hacking in Your Blood?

I am a hacker. I get hired by companies to break into their systems, a job commonly referred to as pentesting. I’m a “good guy” hacker. My definition of “good guy” versus “bad guy” is that good guys only hack with permission and they get paid less. ;-)I LOVE my job! Often times I have to force myself to stop working in order to do other more important things
Publish At:2017-01-17 17:20 | Read:4343 | Comments:0 | Tags:Featured Articles Off Topic hacking pentesting Information S

The Top 13 Information Security Conferences of 2017

2017 is finally here. You know what that means: another information security conference season is upon us. We couldn’t be more excited!Just like we did last year, we at The State of Security have assembled a list of the top 13 conferences in information security for 2017. We hope you’ll have the chance to attend at least one of these events this
Publish At:2017-01-11 12:55 | Read:5366 | Comments:0 | Tags:Off Topic Conferences CTF hacking Information Security pente


Share high-quality web security related articles with you:)


Tag Cloud