HackDig : Dig high-quality web security articles for hackers

Don’t Let Remote Management Software Contribute to Building Botnets

Many IT departments have undergone some serious changes over the last couple of years when it comes to support and management of devices and applications. Mobile users, scattered offices and different virtualization solutions make it almost impossible for IT professionals to maintain traditional on-site support. Spooky Action at a Distance Some corporations
Publish At:2017-01-11 13:40 | Read:4189 | Comments:0 | Tags:Application Security Data Protection Infrastructure Protecti

User Behavior Analytics: Perfect for Analysis but Not Security

How many times have you read or heard about user behavior analytics (UBA)? Today this term applies to security managers and auditors but not to security administrators. User behavior analytics enable IT teams to track and quickly analyze user behavior anomalies and monitor watch-lists, trends and many other factors relative to users. UBA is a useful tool for
Publish At:2017-01-06 17:25 | Read:4100 | Comments:0 | Tags:Infrastructure Protection Security Intelligence & Analytics

Attacks Targeting Industrial Control Systems (ICS) Up 110 Percent

Since IBM X-Force published its report, “Security Attacks on Industrial Control Systems,” last year, we have observed a startling increase in the number of attacks against these systems. Attacks Against Industrial Control Systems Increasing According to IBM Managed Security Services (MSS) data, attacks targeting industrial control systems (ICS) i
Publish At:2016-12-27 17:15 | Read:5451 | Comments:0 | Tags:Infrastructure Protection X-Force Research Energy and Utilit

The Threat Model of 2017

The threat model is one of the most basic tools IT professionals use to analyze security incidents and scenarios. It is the first stop along the security path where potential hazards can be identified and quantified. Threat models involve judgments about which threats are important to a particular situation. An automated tool that simply lists any potential
Publish At:2016-12-03 00:10 | Read:4875 | Comments:0 | Tags:Data Protection Infrastructure Protection Network & Endpoint

Football and Firewalls: A Winning Game Plan to Improve Network Security

As we approach Thanksgiving in the U.S., the one thing I look forward to the most — aside from turkey and spending time with my family — is football. As I watch the games, the security geek in me can’t help but notice some parallels between football and network security, particularly firewalls and intrusion prevention. Network Security Playbook During
Publish At:2016-11-23 00:40 | Read:5520 | Comments:0 | Tags:Infrastructure Protection Network & Endpoint firewall Firewa

Protecting Both Your Network and Investment: The Total Economic Impact of Intrusion Prevention

Intrusion Prevention in the Age of the Customer In the Age of the Customer, a time when companies are competing harder than ever to win, serve and retain consumers, the ability to share information has never been more important. Companies that are able to easily share, from either a business-to-business or a business-to-consumer perspective, often provide a
Publish At:2016-01-28 17:25 | Read:4676 | Comments:0 | Tags:Infrastructure Protection Network & Endpoint Forrester Intru

Manufacturing Security: Managing Machines in Motion

The manufacturing industry — including, but not limited to, automotive, electronics, food and beverage, textile and pharmaceutical companies — depends on production processes running at optimum efficiency to satisfy market demand. What happens when these processes are altered unintentionally or maliciously? The consequences could range from financial loss du
Publish At:2016-01-06 21:00 | Read:3646 | Comments:0 | Tags:Industries Infrastructure Protection Cybersecurity Industria

Inside the Mason-IBM-NSF Insights for Securing Industrial Control Systems

The Mason-IBM-NSF April 2015 conference engaged industry, academia and government in a dialogue to address the challenges and uncertainties associated with securing industrial control systems (ICS) and processes, including supervisory control and data acquisition (SCADA) systems. It also made recommendations on possible actions and steps for industry leaders
Publish At:2016-01-01 14:25 | Read:3703 | Comments:0 | Tags:Energy and Utility Infrastructure Protection Energy and Util

Why You Should Consider Using Privileged Password Access Managers

Account Credentials Are Child’s Play for Cybercriminals The “Black Hat 2015 Hacker Survey Report” from Thycotic showed just how easy it is for attackers to steal privileged account credentials. According to the study, which was completed during this year’s Black Hat USA conference, 94 percent of cybercriminals find this information in
Publish At:2015-12-22 19:20 | Read:4444 | Comments:0 | Tags:Application Security Infrastructure Protection Access Manage

Treat Technical Debt Like a Bad Relationship

The notion of technical debt is a long-understood concept in software engineering, product development and delivery. It results in a cost associated with maintaining and perpetuating technical content that maintains, but does not advance, capabilities. It’s a drag on innovation and limits agility when addressing new opportunities. When considering cybe
Publish At:2015-12-22 01:15 | Read:3948 | Comments:0 | Tags:Cloud Security Infrastructure Protection Cybersecurity Secur

IBM Security Returns to Leadership Position in 2015 Gartner Magic Quadrant for Intrusion Prevention Systems

IBM Security is back in the Leaders quadrant in the latest Gartner Magic Quadrant for Intrusion Prevention Systems (IPS), published on Nov. 16, 2015. We believe this is strong recognition of our commitment to delivering highly innovative, best-in-class products focused on providing advanced threat defense solutions. Characteristics of ‘Leaders’
Publish At:2015-12-01 17:00 | Read:15278 | Comments:0 | Tags:Infrastructure Protection Network & Endpoint Gartner Gartner

What Are the Risks of Legacy Infrastructure?

The vast majority of organizations rely on computing systems to run their operations, but for many, those networks have been built up over a number of years. As a result, many organizations find themselves relying on legacy infrastructure. Maintaining legacy systems can be costly. A recent report by the U.S. Government Accountability Office (GAO) found that
Publish At:2015-11-24 22:15 | Read:3961 | Comments:0 | Tags:Infrastructure Protection Cloud Cloud Computing Critical Inf

Making a Better Threat Management Sandwich

Do your security products look like the mega-sandwich of the Dagwood cartoon strip, with so many different meats and cheeses and condiments piled up that, while impressive, it’s impossible to consume? Although a potentially delicious solution (sandwich) to a very pressing problem (hunger), this may not be the best way to streamline your threat manageme
Publish At:2015-10-20 15:15 | Read:4121 | Comments:0 | Tags:CISO Infrastructure Protection Advanced Threats Malware Thre

The Smart Office Needs to Know Security

The ever-expanding Internet of Things (IoT) continues to grow unabated. Simple everyday items are becoming connected to the Internet. Potted plants are now able to tell you if they are too cold or thirsty and can automatically adjust the room temperature or water themselves. I can only imagine what the original Luddites would think. The ability to remotely m
Publish At:2015-10-20 15:15 | Read:4215 | Comments:0 | Tags:CISO Infrastructure Protection Data Security Internet of Thi

AT&T and IBM Mobile Cloud Security Set to Scale Work Anywhere

IBM is set to join the stage at this year’s 17th Annual AT&T Cybersecurity Conference in New York City, where it will announce the AT&T and IBM mobile cloud security solution. It’s a simplistic concept in name, but it tethers a vastly complex array of domains across devices, apps, networks and cloud computing to tackle the current busines
Publish At:2015-10-07 14:05 | Read:4184 | Comments:0 | Tags:Cloud Security Infrastructure Protection Mobile Security App