HackDig : Dig high-quality web security articles for hacker

Cybersecurity vs Productivity: The CISO’s Dilemma

Today organizations are struggling with the best way to protect against attacks that are targeting the endpoint. Too often, the security strategy has been to put the onus on the individual employee. Research has shown, over and over again, that training and user restrictions are both tedious and expensive, and have a very low success rate. This is because c
Publish At:2017-10-23 23:40 | Read:4148 | Comments:0 | Tags:Company News CISO defense dilemma end users hackers infograp

VMworld 2017 – Our Virtualization-Based Security Resonated with Architects, CISOs and Security-Minded Professionals

We were so happy to be in our element with folks who understand the inherent value in virtualization. From booth demos to our theater presentation on the Showcase stage to the private breakfast with The Godfathers of Virtualization, we received amazing feedback. We look forward to bringing our solution to your business – is it time for a meeting? VMworld i
Publish At:2017-09-05 12:15 | Read:4533 | Comments:0 | Tags:Company News architect productivity Security Virtualization

OpenOffice coders debate retiring the project

Concerns at the Apache Software Foundation that the Apache OpenOffice project it hosts might be failing have prompted a debate about retiring the project, and triggered the resignation of at least one member of the project's management committee. The office productivity suite was once a key element of efforts to build an open source alternative to Micros
Publish At:2016-09-05 20:45 | Read:4312 | Comments:0 | Tags:Open Source Security Productivity Application Development

Finding the Balance Between Security and Productivity

The majority of employees within an organisation are hired to execute specific jobs, such as marketing, managing projects, manufacturing goods and overseeing financial investments. Their main – sometimes only – priority is to efficiently complete their core business activity, so information security is usually only a secondary consideration.Consequently, emp
Publish At:2016-07-26 03:55 | Read:4679 | Comments:0 | Tags:Connecting Security to the Business Featured Articles busine

Office 365 Advanced Security Management brings powerful protection for a price

Enterprises using Microsoft's Office 365 have a new security product that they can use to better lock down their organizations -- for a price. The company introduced a new Advanced Security Management service on Wednesday that gives companies a trio of tools aimed at helping detect security threats, provide granular controls and let IT administrators tra
Publish At:2016-06-01 20:50 | Read:2771 | Comments:0 | Tags:Security Productivity Software Software as a Service (SaaS)

Microsoft brings advanced security management to Office 365

Security in the cloud is all about visibility and control, and Microsoft is aiming to give Office 365 customers more of both with Wednesday's introduction of Office 365 Advanced Security Management."This is really tailored to the chief security officer, the IT administrator — in smaller businesses, the IT manager," says Ron Markezich, corporate vice pres
Publish At:2016-06-01 20:50 | Read:3147 | Comments:0 | Tags:Cloud Security Security Productivity Cloud Computing

Slack is letting its users take their chat credentials to other apps

Slack is offering its users a new way to sign into other applications. The company announced Tuesday that it has launched a new "Sign in with Slack" feature that lets people use their login for the chat app to sign in to participating applications. Developers of applications like Quip can now enable their users to sign in with Slack credentials, which ca
Publish At:2016-05-10 19:35 | Read:4383 | Comments:0 | Tags:Collaboration Identity Management Security Productivity Soft

IT leaders pick productivity over security

Results from two recent studies suggest that cybersecurity needs an overhaul at most companies with root causes of the problem including poor communication, a lack of employee awareness, slowed productivity and a lack of budget.In its 2016 Cybersecurity Confidence Report, Barkly, an endpoint security company, surveyed 350 IT pros to determine the top sec
Publish At:2016-05-02 10:50 | Read:3722 | Comments:0 | Tags:Security Productivity Leadership and Management Relationship

Are you using Facebook at work? (Poll)

I’m sure you have run into it if you work at a company with an organized IT function. They provide you with a computer, but they control it and set restrictions on what you can do with it. This is justified. Keeping the systems patched and updated is necessary to maintain security. Not to talk about maintenance of the anti-malware. But security is not the on
Publish At:2015-11-10 09:15 | Read:2454 | Comments:0 | Tags:Social media Facebook plicies plocy productivity social medi

Intego Updates Flextivity, Improves Security and Productivity for SMBs

Intego has updated Flextivity to version 1.5 with improvements to device management and network security for businesses. This update offers several new features, including bulk approval of devices for greater efficiency, and improves application firewall rules for better control over network security.According to the National Small Business Association, 40 p
Publish At:2015-08-13 19:05 | Read:3739 | Comments:0 | Tags:Intego Cloud-Based Security employee monitoring Flextivity F

EFF-led group wants to give do-not-track some bite

For years now, checking the “do-not-track” option on your browser has been little more than wishful thinking on the part of users who care about privacy online. But now a group led by the Electronic Frontier Foundation is looking to make that a more meaningful action.The EFF and others have published a standard policy it hopes advertisers, analytics companie
Publish At:2015-08-05 03:30 | Read:3089 | Comments:0 | Tags:Productivity Advertising IT Industry Marketing Security Comp

Ad group urges FTC to reject right to be forgotten in US

The U.S. Federal Trade Commission should reject a privacy group’s push to extend the E.U.’s controversial right to be forgotten rules to the U.S. because such regulations would have a “sweeping” negative effect on many U.S. companies, a trade group said.The FTC should dismiss a July 7 complaint from Consumer Watchdog against Google, the Association of Nation
Publish At:2015-07-31 19:00 | Read:3468 | Comments:0 | Tags:Internet Internet of Things Networking Productivity Search G

10 Cool Safari Extensions for Warp Speed Productivity

This is the first installment in our Top 10 List Bonanza series helping you prepare for back to school. Everybody loves a top 10 list; some of our lists might not be exactly 10, some might be 5 or 15, but these are the top lists for you as a student or parent to get revved up for back to school — on the right foot. And we'll give you some discounts along wit
Publish At:2015-07-28 17:55 | Read:6244 | Comments:0 | Tags:Software & Apps Extensions productivity Safari Top 10 List B

Over 10 million Web surfers possibly exposed to malvertising

Upwards of 10 million people may have visited websites carrying malicious advertisements in the last ten days, possibly infecting their computers with malware, according to computer security company Cyphort.For the past month, Cyphort has been tracking various malicious advertisement campaigns, which involve duping online advertising providers into distribut
Publish At:2015-07-28 03:00 | Read:2590 | Comments:0 | Tags:Security Productivity Advertising IT Industry Marketing

New York judge rules against Facebook in search warrant case

A New York judge ruled Tuesday that Facebook has no legal standing to challenge the constitutionality of search warrants served on its users, highlighting the limits to online companies’ abilities to protect user privacy.Last year, Facebook appealed a court decision requiring it to hand over data, including photos and private messages, relating to 381 user a
Publish At:2015-07-22 06:45 | Read:4153 | Comments:0 | Tags:Legal Regulation Government Business Security Compliance Pri


Share high-quality web security related articles with you:)


Tag Cloud