HackDig : Dig high-quality web security articles

CIS Control 15: Service Provider Management

Enterprises today rely on partners and vendors to help manage their data. Some companies depend on third-party infrastructure for day-to-day operations, so understanding the regulations and protection standards that a service provider is promising to uphold is very important.Key Takeaways from Control 15Identify your business needs and create a set of standa
Publish At:2022-02-24 02:07 | Read:1074 | Comments:0 | Tags:Featured Articles Security Controls Center for Internet Secu

Lessons From Teaching Cybersecurity: Week 9

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python ai
Publish At:2020-12-03 13:50 | Read:3757 | Comments:0 | Tags:Featured Articles Human Behavior human resources Management

Explained: What is containerization?

Containerization. Another one of those tech buzzwords folks love to say but often have no idea what it means. A better way to organize children’s toys? The act of bringing tupperware out to dinner to safely transport home leftovers? Another name for Russian dolls? Containerization is, of course, none of those things. But its definition might be best
Publish At:2019-12-04 16:50 | Read:3446 | Comments:0 | Tags:Explained cloud containerization containers instances manage

How to Draft an Incident Response Policy

Section 1. IntroductionSimultaneously with their growing online presence, companies and individuals become increasingly susceptible to cyber-security attacks. Most organizations prefer to avoid and mitigate the damage caused by such attacks by establishing and implementing information security policies and plans.When drafting information security polic
Publish At:2017-09-18 17:00 | Read:9024 | Comments:0 | Tags:Management Compliance & Auditing

Virtualization-Based Security is Helping Security Professionals Relax

Virtualization’s continued journey across the enterprise led inevitably to security Enhanced security benefits using virtualization are powerful and compelling Virtualization takes the security responsibility off users and delivers control to IT Detection-based security doesn’t work. It’s an exhausted concept. The battle’s been waged for 30 years and the c
Publish At:2017-08-03 12:45 | Read:6537 | Comments:0 | Tags:Innovation cybersecurity detection intelligence management p

Proactive vs. Reactive Compliance Management

Much of my time spent working is focused on performing technology assessments against some kind of baseline. Most of the time, these are specific government or industry standards like HIPAA, NIST, ISO and PCI. But when some of my clients reach out to me about evaluating their environment in light of these standards, it’s often done out of a feeling of obliga
Publish At:2017-01-26 04:00 | Read:8190 | Comments:0 | Tags:Regulatory Compliance compliance Management risk

Identifying Cyber Risks: The Important Role of Senior Management

It is becoming more and more evident that cybersecurity is one of the focal points regarding security risks in the twenty-first century for all organisations.It is understandable that almost every organisation that has access to any kind of computing devices will be at risk and will probably experience harmful cyber incidents. Hackers, whether via individual
Publish At:2016-08-02 00:25 | Read:13036 | Comments:0 | Tags:Connecting Security to the Business Featured Articles Risk M

Entry Level Risk Management: Creating a First Security Risks Register

Organizations of all sizes apply risk management to their operations. In larger ones, this will normally be through a formal Enterprise Risk Management (ERM) methodology. An ERM can ensure higher level risks are left to senior managers, with lower-level risk decisions delegated to qualified people (i.e. through experience and training). In smaller orga
Publish At:2016-07-15 12:10 | Read:6568 | Comments:0 | Tags:Management Compliance & Auditing

Legal Issues of New and Emerging Technologies

1. INTRODUCTION    12. PRIVACY ISSUES    12.1 Security vulnerabilities threatening the privacy of NET users    12.2 Using NET for unlawful surveillance    12.2.1 Unlawful use of beacons    12.2.2 Unlawful collection of personal data through social networking platforms    12.2.3 Unlawful use of RFID technology    13. ISSUES RELATED TO GATHERING EVIDENCE
Publish At:2016-02-24 20:05 | Read:9511 | Comments:0 | Tags:Management Compliance & Auditing

SAP Afaria Security: Attacking Mobile Device Management (MDM) Solution

It is known that the BYOD trend is changing the way enterprises are managed, delivered, and, most importantly, secured. While BYOD has its benefits, such as increased productivity, it poses security risks to the organization because of connections with the corporate network and access to corporate data. To minimize the threats, businesses should adopt
Publish At:2016-02-01 11:25 | Read:10825 | Comments:0 | Tags:Management Compliance & Auditing

Why ITIL, COBIT and Other Non-Infosec Based Frameworks Are Infosec’s Best Friends

As a current or aspiring security professional, you will know of a range of information security frameworks and enablers. These might include standards, e.g. ISO 27001, PCI DSS; risk management methodologies, e.g. Octave, IRAM 2, and security specific guidelines, e.g. the NIST Special Publications (SP) 800 series and Federal Information Processing Stan
Publish At:2016-01-26 10:45 | Read:6528 | Comments:0 | Tags:Management Compliance & Auditing

Breaking Bad Behavior: Why Non-SIEM Behavioral Analysis May Not Be All It’s Cracked Up to Be

Executive SummaryBehavioral Analysis is becoming a huge buzzword in the IT and Information Security industries. With the idea that you can automatically determine whether or not what’s going on within your network is legitimate or not is a huge benefit to any organization. But, challenges exist. The sheer volume of data available makes finding at
Publish At:2016-01-19 16:00 | Read:8071 | Comments:0 | Tags:Management Compliance & Auditing

More Executives Turn to Cyber Risk Transfer

As cyber threats grow in scope and potential impact, the complexity of enterprise digital data protection grows to astonishing proportions. Last year, a Fortune 500 survey revealed that cyber security is the second biggest concern for CEOs, who keep looking for new solutions to keep their data safe and their clients happy.The enterprise data is worth more t
Publish At:2016-01-06 02:10 | Read:8767 | Comments:0 | Tags:Featured Articles Security Awareness Cyber Risk insurance Ma

Tips for Being a Pragmatic CSO

The cybersecurity landscape is ever-changing, with new threats and technologies appearing every single day. There are more data breaches than ever, more compliance guidelines, and more new technology to secure in the workplace that has the potential to be misused by untrained employees. So why, then, does senior management tend to see security as an ov
Publish At:2015-10-21 08:50 | Read:10165 | Comments:0 | Tags:Management Compliance & Auditing


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud