HackDig : Dig high-quality web security articles

Digital Transformation: Balancing Speed, Security and Innovation

Today, digital transformation (DX) is happening in every industry. Organizations operating in sectors that typically eschew technology are moving to the cloud, leveraging IoT and using analytics. Digital transformation plays a critical role for any company to stay competitive and resilient. But what does digital transformation look like for most companies,
Publish At:2022-01-13 10:07 | Read:37713 | Comments:0 | Tags:Application Security Cloud Security Data Protection Incident

Leveraging Open Source Can be Powerful for Cybersecurity

Security vendors and end users have access to the same technology and resources, if not more, than the threat actor community. However, the area where cybersecurity falls short as an industry is teamwork. Vendors and end users rarely talk to each other as a broader force. Thus, while innovation may happen for individual products, that innovation may not flow
Publish At:2020-07-24 09:11 | Read:16714 | Comments:0 | Tags:Risk Management Advanced Threat Protection Innovation Mirai

3 Emerging Innovations in Technology that Will Impact Cyber Security

It goes without saying that innovations and trends in technology have a direct impact on digital security. Just look at what happened with COVID-19. As organizations switched their workforces to remote connectivity, many security teams shifted their attention to deploying enterprise-wide VPNs and partnering with employees to harden their home networks/device
Publish At:2020-07-22 06:51 | Read:27425 | Comments:0 | Tags:Featured Articles Security Awareness Foundational Controls i

Achieve Flexibility in Business Through Digital Trust and Risk Management

I grew up watching professional football back in the 70s, when defenses were so good they had their own nicknames. The Pittsburgh Steelers had the “Steel Curtain,” the Miami Dolphins had the “No-Name Defense” and the Dallas Cowboys had the “Doomsday Defense.” The Cowboys’ defense was based on a newfangled concept cal
Publish At:2020-04-21 10:39 | Read:32169 | Comments:0 | Tags:CISO digital trust Business Continuity Customer Experience D

Embracing the Power of Community for Better Security

If you ask any business leader what their goals are for 2020, at some level you’re likely to hear “innovation.” Innovation is essential for competing in the global economy because it helps businesses stay relevant and teams work more efficiently. This need for constant improvement is incredibly clear in the security industry, where both bus
Publish At:2020-03-05 08:37 | Read:51111 | Comments:0 | Tags:Cloud Security Collaboration Innovation Open Source Security

SANS Maturity Model Webinar Describes How to Grow Your Security Strategy

Setting your security strategy is a challenging task that comes with lot of opinions (and vendors!). SANS provides a rationale for growing protection that is logically calibrated to growth and expanding needs. Register for this webinar and even if you can’t make it, we’ll send you the recording (and a whitepaper). With so many security solution
Publish At:2017-10-21 16:25 | Read:51336 | Comments:0 | Tags:Innovation maturity model recording registration SANS Securi

Virtualization-Based Security is Helping Security Professionals Relax

Virtualization’s continued journey across the enterprise led inevitably to security Enhanced security benefits using virtualization are powerful and compelling Virtualization takes the security responsibility off users and delivers control to IT Detection-based security doesn’t work. It’s an exhausted concept. The battle’s been waged for 30 years and the c
Publish At:2017-08-03 12:45 | Read:46377 | Comments:0 | Tags:Innovation cybersecurity detection intelligence management p

Breachless Threat Intelligence: A Pain-Free Approach to CyberSecurity

Enterprises need a steady stream of actionable, timely, and accurate threat intelligence on targeted malicious intrusions and attempts into their networks They need this information without suffering breaches and cannot rely solely on post-compromise forensics or sandbox simulations to continuously tighten and adapt their defenses Pre-breach targeted intell
Publish At:2017-07-17 06:40 | Read:140411 | Comments:0 | Tags:Innovation breach breachless detection disposable Forensics

Disposable Computing is the Essence of Bromium’s Micro-Virtualization

We live in a disposable society, from our ever-present convenience foods in throw-away packaging to online speed-dating tailor-made for today’s low attention-span, instant gratification, swipe-left culture. Why be stuck with the same cruddy old PC filled up with accumulated digital gunk day after day, when you can have a squeaky-clean brand new computer eac
Publish At:2017-06-21 23:00 | Read:25252 | Comments:0 | Tags:Innovation computing disposable endpoints innovators kill-ch

Disposable Computing is the Answer to Cyber Security for Business

Disposability has become a regular thing in our lives; but you may have taken for granted the value it brings. Cost, convenience and risk are the cornerstones of successful disposability. Disposable computing offers a solution to cyber security and provides you with valuable threat information. This is the first in our two-part series on disposable computi
Publish At:2017-06-21 04:35 | Read:39231 | Comments:0 | Tags:Innovation computing convenience cost disposable end users I

Why Bromium Is Not Just Protection, But Also An Enhanced Predictive Analytics Solution

Zero-day attacks exploit vulnerabilities or security holes in software. In the event of a malicious attack on any microVM, malware payloads cannot infiltrate the enterprise network. LAVA provides highly specific details about every malicious breach, identifying external IP addresses, memory exploits, a list of affected files, and covert attempts to connect
Publish At:2017-04-16 13:05 | Read:33417 | Comments:0 | Tags:Innovation Data Analytics Endpoint Protection Forensics Virt

New Approaches to Cybersecurity Drive IT Innovation

A surprising thing happened when organizations around the world got serious about protecting themselves, their data and their customers from sophisticated cyberthreats: They developed new, dynamic approaches to cybersecurity that fueled IT innovation and extended beyond the security realm to make enterprises more effective and competitive. On second thought,
Publish At:2017-02-06 17:05 | Read:43774 | Comments:0 | Tags:Security Intelligence & Analytics Cloud Cloud Adoption Cloud

Why cybersecurity spending will drive business digitization

The days of CEOs regarding data protection technologies and staff as a budget drain and operating tax that stifles innovation are over. Galvanized by high-profile breaches, companies are shelling out more money to shore up corporate defenses. CEOs also recognize that security is table stakes for building digital products and are entrusting their CISOs wi
Publish At:2016-10-07 01:40 | Read:38314 | Comments:0 | Tags:Security Budget Cybersecurity Innovation CIO Role

Former CSO of AT&T, Dr. Edward Amoroso, talks mobile attackers and how enterprise security teams should innovate

Dr. Amoroso is a former SVP and CSO of AT&T. He is currently on the board of M&T Bank and the CEO of TAG Cyber, which has just released the 2017 TAG Cyber Security Annual, a comprehensive reference guide for cyber security professionals. Lookout: What made you start a project like the 2017 TAG Cyber Security Annual? Dr. Amoroso: A challenging conu
Publish At:2016-09-09 13:45 | Read:36648 | Comments:0 | Tags:Security CISO CSO Edward Amoroso innovation mobile security

IDG Contributor Network: MIT hosts the W3C blockchain interoperability workshop

The W3C is presenting the workshop W3C Blockchains and the Web, hosted by the MIT Media Lab.Exploring identity, value exchange, asset recording, consortium frameworks, and reputations systems all fall within the mystic of the blockchain. Blockchain platforms could offer distributed micro-services that can be applied to the web, enabling personali
Publish At:2016-06-30 01:00 | Read:58974 | Comments:0 | Tags:Consumer Technology Internet Internet of Things Innovation S


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud