HackDig : Dig high-quality web security articles for hacker

Physical security and quantum computing

Physical security and quantum computing Posted by Rob Slade on October 3, 2016.There is probably not a great deal that quantum computing can do to benefit physical security. As previously noted, biometrics may be improved, and these are being increasingly used for physical access cont
Publish At:2016-10-03 22:55 | Read:2942 | Comments:0 | Tags:Expert Views Insights Perspectives Rob Slade Security

Cryptography and quantum computing

Cryptography and quantum computing Posted by Rob Slade on September 29, 2016.Yes, I know I complained about it at the beginning, and I’ve dealt with it elsewhere, but I suppose I really have to address it. (There actually are a number of issues about cryptography and quantum com
Publish At:2016-09-30 03:35 | Read:2718 | Comments:0 | Tags:Expert Views Insights News_encryption Rob Slade Security

Quantum computing and security management

Quantum computing and security management Posted by Rob Slade on September 21, 2016.Having looked at the basics of quantum computing, and the fundamental problems they can address, let’s turn to applying some of that to security itself, starting with security management.In securi
Publish At:2016-09-21 18:40 | Read:3498 | Comments:0 | Tags:Expert Views Insights Perspectives Rob Slade Security

The IOC effect?

The IOC effect? Posted by Rob Slade on August 13, 2016.The Streisand effect is well known in online circles. If you attempt to hide or censor something, you inevitably draw attention to it.The International Olympic Committee seems to have discovered, or created, a new law. The IOC ha
Publish At:2016-08-13 22:35 | Read:2262 | Comments:0 | Tags:Insights News News_politics Perspectives Rob Slade Social Me

What do the simple folk do for security?

What do the simple folk do for security? Posted by Rob Slade on July 28, 2016.I don’t mean to offend anybody with that title: it’s just a joke on the song from “Camelot.” But it does raise an issue.I’ve never been an uber geek. It’s been decades si
Publish At:2016-07-28 22:35 | Read:2979 | Comments:0 | Tags:Expert Views Insights Perspectives Rob Slade Security

The Juniper backdoor and its implications

The Juniper backdoor and its implications Posted by Kevin on March 14, 2016.In December 2015 Juniper disclosed that it had found two backdoors in its firewalls – one of which allows encrypted traffic passing through to be decrypted. Since then there has been considerable debate over wh
Publish At:2016-03-15 03:30 | Read:2866 | Comments:0 | Tags:Insights

Responding to Incidents and Preventing Crises

Responding to Incidents and Preventing Crises Posted by Kevin on October 28, 2015.The gradual realization that we cannot keep hackers out of our networks has led to the evolution of a new security concept: incident response. This states that equal emphasis should be placed on the respo
Publish At:2015-10-29 07:55 | Read:3340 | Comments:0 | Tags:Insights CISO incident response

The CISO and the thin ice syndrome

The CISO and the thin ice syndrome Posted by Kevin on October 16, 2015.FierceHealthIT magazine recently ran an article that commented,Almost half of C-level executives throughout all industries lack confidence in their chief information security officer (CISO), often viewing him or her
Publish At:2015-10-16 13:50 | Read:2351 | Comments:0 | Tags:Insights CISO

The CIO view of where the CISO fits in the corporate hierarchy

The CIO view of where the CISO fits in the corporate hierarchy Posted by Kevin on June 30, 2015.CISOs reporting to IT: Symantec figuresSo here’s the problem: the majority of CISOs report to the CIO; and the majority of those that do, wish they didn’t. They have two primary
Publish At:2015-07-02 19:25 | Read:4093 | Comments:0 | Tags:Insights CIO CISO

CISO Speaking Business’ Language – don’t become a headless messenger

CISO Speaking Business’ Language – don’t become a headless messenger Posted by Kevin on June 10, 2015.Business and Security are two separate breeds, divided by motivations, methods and above all, language. But while Business does not need Security to do its job, Security ca
Publish At:2015-06-10 16:10 | Read:2702 | Comments:0 | Tags:Insights CISO

IAM: Proprietary Vs Cloud

IAM: Proprietary Vs Cloud Posted by Kevin on June 1, 2015.Wisegate will shortly publish the results of a survey into the current state of Identity and Access Management (IAM) maturity within business. Almost 150 CISOs took part. What we’re going to look at today is attitudes towa
Publish At:2015-06-02 05:20 | Read:3463 | Comments:0 | Tags:Insights Beanstalk CISO IAM identity verify Cloud

Developing a Security Strategy Document

Developing a Security Strategy Document Posted by Kevin on May 12, 2015.It’s important to have a security strategy plan. Although this might seem an obvious statement, relatively few companies have actually committed their plan to a formal strategy document. That’s what we&
Publish At:2015-05-13 13:05 | Read:3085 | Comments:0 | Tags:Insights

NSTIC – it will prove our identity but will it protect our privacy?

NSTIC – it will prove our identity but will it protect our privacy? Posted by Kevin on May 4, 2015.NSTIC, the National Strategy for Trusted Identities in Cyberspace, is an Obama initiative designed to make internet usage more secure for everyday users. It will do this by allowing third
Publish At:2015-05-04 12:30 | Read:3635 | Comments:0 | Tags:Insights identity NSTIC passwords privacy verify

Security is everyone’s responsibility!

Security is everyone’s responsibility! Posted by Bev Robb on April 29, 2015.Four simple wordsThis morning I accepted a new LinkedIn connection who works for Johns Hopkins University and SANs. Aside from all of his certifications, and over a decade of security experience — he is a
Publish At:2015-04-29 17:15 | Read:3000 | Comments:0 | Tags:Bev Robb Insights Security Teksquisite IoT privacy security

Phishing: detection and prevention

Phishing: detection and prevention Organizations can be divided into those that have been successfully phished, and those that will be successfully phished. In fact, there is nothing more certain in life than death, taxes and phishing. At a recent internal roundtable discussion on the
Publish At:2015-04-27 15:55 | Read:2500 | Comments:0 | Tags:Insights phishing spearphishing

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud