HackDig : Dig high-quality web security articles for hacker

Know Your Data and Your Enemies: Establishing a Baseline for Proactive Threat Hunting

The purveyors of modern threats are not trying to simply deface your website or own your web server. These advanced attackers are attempting to siphon critical and sensitive data from your network over long periods of time, and do so undetected. Where Is Your Data? When threat hunting, at a minimum, you should know where your critical data is stored and how
Publish At:2017-09-06 20:40 | Read:197 | Comments:0 | Tags:Data Protection Incident Response Risk Management Security I

Keep Intruders Out of Your Network With Proactive Threat Hunting

A threat hunting program can provide an accurate picture of where your organization is exposed to threats and help security professionals strengthen those weaknesses. If you know how an adversary is breaking into your environment, you can improve your defenses and stop attacks from happening again in the future. This echoes the importance of having accurate
Publish At:2017-08-30 20:10 | Read:187 | Comments:0 | Tags:Network Risk Management C-Suite Network Protection Network S

Getting Ahead of SD-WAN Security With the Zero Trust Model

As businesses across the world become more geographically diverse and move toward an increasingly hybrid IT environment, legacy infrastructure is struggling to keep up. With more data flowing over enterprise networks from multiple sources, the demand for software-defined wide area network (SD-WAN) technology is growing exponentially. A report from IDC predic
Publish At:2017-08-24 16:50 | Read:156 | Comments:0 | Tags:Network Infrastructure Protection Infrastructure Security ne

Advanced Approaches to ATM Network Protection

End-to-end automated teller machine (ATM) network protection encompasses multiple security layers. Is it not enough to simply protect ATM endpoints to ensure the security of a bank’s finances. Instead, security teams at financial institutions must take a more advanced approach to ATM network protection. ATM security has always been a hot-button issue
Publish At:2017-08-11 15:05 | Read:345 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Network Securi

Administrator Credentials: A Security Breach Waiting to Happen

A potential security risk lurks within every business, from the extensive enterprise computer network to the small business with a handful of synced desktops and laptops. This security hole can be attributed to administrator credentials. Plugging the hole is challenging because administrator accounts and their access credentials are essential to the security
Publish At:2017-07-25 11:50 | Read:184 | Comments:0 | Tags:Identity & Access Risk Management Identity and Access Manage

Stopping Threats in Their Tracks With Proactive Monitoring

With household names such as Renault ceasing manufacturing and the National Health Service of the U.K. actively redirecting patients from hospitals that are incapable of providing critical health care, ransomware has moved well beyond an annoyance that impacts your grandmother’s laptop and directly into the global spotlight. Over the past few days, how
Publish At:2017-05-24 19:10 | Read:467 | Comments:0 | Tags:Network Security Intelligence & Analytics Network Protection

Five Ways in Which the IoT Will Disrupt Your Business

The Internet of Things (IoT) leverages network connections to communicate between devices and systems, and it is ready to disrupt your business. Enterprises are already deploying smart devices in may ways: Some IoT capabilities are designed to help organizations manage operations, while others are intended to improve customer-oriented products. In either cas
Publish At:2017-05-02 00:35 | Read:619 | Comments:0 | Tags:Endpoint Mobile Security Network Connected Devices Internet

Things to Consider Before Implementing Advanced Network Security

Today’s networked world is constantly shifting, and the number and type of devices it connects changes minute by minute. The combination of in-house computing, cloud-based resources and a mobile workforce armed with a growing diversity of devices means advanced network security systems need to be both flexible and agile to detect intrusion and malware
Publish At:2017-04-03 11:00 | Read:652 | Comments:0 | Tags:Network & Endpoint Corporate Network Security Data Protectio

Are You Getting the Most From Your Network Security? Five Questions to Ask

For nearly 20 years, network security solutions, including firewalls and intrusion detection and prevention systems, have been the foundational building blocks of an effective security program. However, as attack methods evolve, it is critical to determine whether your network technologies are not only keeping up with the latest threats, but also integratin
Publish At:2017-03-20 15:15 | Read:757 | Comments:0 | Tags:Network & Endpoint Encryption IBM Security Network Protectio

The Full Shamoon: How the Devastating Malware Was Inserted Into Networks

Authored by the IBM X-Force Incident Response and Intelligence Services (IRIS) team Researchers from the IBM X-Force Incident Response and Intelligence Services (IRIS) team identified a missing link in the operations of a threat actor involved in recent Shamoon malware attacks against Gulf state organizations. These attacks, which occurred in November 2016 a
Publish At:2017-02-15 22:35 | Read:1581 | Comments:0 | Tags:Advanced Threats Threat Intelligence X-Force Research Advanc

It’s Time to Go Beyond Next-Generation Endpoint Security

Endpoints are at the center of the universe of advanced attacks. They’re the most vulnerable, and act as a favored attack vector for cybercriminals because they provide the easiest entry points into your network. If you work in IT, you know how vulnerable endpoints can be and understand the need for a continuous approach to securing them, both proactiv
Publish At:2017-02-13 15:10 | Read:799 | Comments:0 | Tags:Cognitive Network & Endpoint Security Intelligence & Analyti

A Primer on IoT Security Risks

The security requirements of an Internet of Things (IoT) system are complex. They extend past the traditional information security requirements of confidentiality, integrity and availability. They also need to address authentication, authorization, freshness of data, nonrepudiation, and forward and backward secrecy. Taking Stock of Today’s IoT Security
Publish At:2017-02-09 00:20 | Read:868 | Comments:0 | Tags:Application Security CISO Fraud Protection Network & Endpoin

The Zero Trust Model for Living in a Hacked World

Although data breaches happen to corporations, the impact ultimately affects normal citizens like you and me. When we fall victim to credit card breaches, the associated anxiety and uncertainty is not addressed beyond proffered, free credit watch and protection services. Our personal email accounts are also at risk of misuse. According to CNN, a recent call
Publish At:2017-02-03 15:20 | Read:675 | Comments:0 | Tags:Identity & Access Network & Endpoint Access Management Cloud

Secure SD-WAN: The First Step Toward Zero Trust Security

Imagine the typical network architecture of any enterprise. It’s usually an unruly collection of network connections going in all directions between a wide array of infrastructure devices on a legacy flat network. Every time the infrastructure requires a change, you take a deep breath and open up the network diagram, hoping you can somehow wedge your n
Publish At:2017-01-30 19:15 | Read:848 | Comments:0 | Tags:Network & Endpoint Cloud Cloud Security Infrastructure Prote

Don’t Let Remote Management Software Contribute to Building Botnets

Many IT departments have undergone some serious changes over the last couple of years when it comes to support and management of devices and applications. Mobile users, scattered offices and different virtualization solutions make it almost impossible for IT professionals to maintain traditional on-site support. Spooky Action at a Distance Some corporations
Publish At:2017-01-11 13:40 | Read:769 | Comments:0 | Tags:Application Security Data Protection Infrastructure Protecti

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud