HackDig : Dig high-quality web security articles

HITRUST: the Path to Cyber Resilience

There has been a lot of talk recently about cyber resilience. There is no doubt that the ability to bounce back from a security event is important, however, all of the resiliency banter seems to be happening at the peril of sound risk management processes.  It is safe to say that the path to resilience is paved with risk management.Risk management can b
Publish At:2022-06-06 02:13 | Read:48959 | Comments:0 | Tags:Featured Articles Risk Management cyber resilience HITRUST R

The Cyber Assessment Framework: Guided Cyber Resilience

Remember how, just a few years ago, many organizations were striving to be cyber secure? Over the last years, it seemed that crowing about one’s cybersecurity posture became the very thing that mocked every organization that was the victim of a newsworthy compromise. Many organizations began augmenting their previously acclaimed security posture towards
Publish At:2022-04-27 02:08 | Read:123760 | Comments:0 | Tags:Featured Articles Security Controls Cyber Assessment Framewo

A Journey in Organizational Resilience: Insider Threats

Very much like privacy concerns, insider threats may not be the first issue to come to mind when building an enterprise cyber resilience plan. However, they should be. Here is why: because as we noted in the first piece of this series, you want to be able to bend while others break. An insider threat is uniquely positioned to make you break in ways no other
Publish At:2021-11-22 13:35 | Read:69834 | Comments:0 | Tags:Incident Response Risk Management Security Services Advanced

2021 Cyber Resilient Organization Study: Rise of Ransomware Shows the Need for Zero Trust and XDR

“How many millions did you pay threat actors in a ransomware attack?” “Which investments most significantly improved cyber resiliency for your organization?” “Do you have a cybersecurity incident response plan that’s applied consistently across your enterprise?” The answers to these and other key questions produced
Publish At:2021-10-28 15:28 | Read:33704 | Comments:0 | Tags:CISO Cloud Security Data Protection Incident Response Risk M

Anticipate, Respond & Adapt: Organizational Resilience

Gary Hibberd, professor of communicating cyber for Cyberfort and former head of business continuity and information security at various companies, teaches the importance of building resilience in your organization not just with technology but also with people and processes.Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.sti
Publish At:2021-06-28 07:44 | Read:42313 | Comments:0 | Tags:Podcast cybersecurity Information Security Resilience

The Connection Between Cloud Service Providers and Cyber Resilience

Organizations in both the private and public sectors have increasingly turned to cloud service providers (CSPs) to support their technical infrastructure, primarily to reduce IT costs and increase the efficiency of computing resources. In many cases, CSPs can also offer protection from security threats and increased cyber resilience — though customers often
Publish At:2020-05-24 06:18 | Read:35253 | Comments:0 | Tags:Cloud Security Cloud Cloud Services Cloud Services Provider

Building Effective Cybersecurity Budgets

Building an effective and resilient organization on a budget isn’t a small task. When it comes to cybersecurity budgets, there are many different aspects that need to be considered. Thankfully, alignment with industry best practice and recognized security frameworks adds a small amount of clarity to this challenge.When presenting the webcast “It’s all
Publish At:2020-04-21 06:36 | Read:42162 | Comments:0 | Tags:Featured Articles budget cybersecurity Resilience

Increase Automation to Overcome Cyber Resilience Challenges

Security operations teams face an exponentially growing volume of security event data while resources mostly remain static. One great way to help solve issues in this space is automation. Despite the recognized benefits of security automation, however, few organizations leverage automation’s capabilities to their full potential, and those who do often
Publish At:2020-02-17 10:47 | Read:47598 | Comments:0 | Tags:Incident Response Security Intelligence & Analytics Automati

10 Tenets for Cyber Resilience in a Digital World

Companies are facing increased and complex cybersecurity challenges in today’s interconnected digital economy. The cyber threats have become more sophisticated and may harm a company via innovative new forms of malware, through the compromise of global supply chains or by criminal and hostile state actors. The hard truth is that it is difficult to counter th
Publish At:2020-02-10 03:08 | Read:59842 | Comments:0 | Tags:Featured Articles cyber hygiene cybersecurity Resilience

NCSAM: It’s Everyone’s Job to Ensure Online Safety at Work

October is National Cyber Security Awareness Month (NCSAM). NCSAM is a great initiative to help educate and inform our friends and family on the importance of taking your digital security seriously. To help continue to support this initiative, we asked a range of industry experts to share some of their tips to help us stay safe online.Angus Macrae | Head of
Publish At:2019-10-18 10:10 | Read:27998 | Comments:0 | Tags:Featured Articles Security Awareness cybersecurity NCSAM Res

3 Questions to Gauge the Resiliency of Your Vulnerability Management Solution

Looking at the cyberthreat landscape, millions of new devices come online every day. But there’s a shortage of qualified cybersecurity workers to protect those devices once they come online. Additionally, in almost every case, it takes minutes or less to compromise them.Simply running more vulnerability scans to collect more data and generating more alerts i
Publish At:2016-09-15 04:40 | Read:30509 | Comments:0 | Tags:Cyber Security Featured Articles Alerts architecture cyberse

Cloud computing and government: understanding security and resiliency benefits

Around the world, governments are looking to cloud computing to help them meet their goals. On February 12, I published a blog post within which I highlighted that, in recent years, more than 50 governments have published strategies or initiatives that focus on cloud computing. As I described, their approaches to cloud adoption vary. However, certain governm
Publish At:2015-03-12 22:50 | Read:76558 | Comments:0 | Tags:Cloud Computing Cybersecurity Policy Cloud compliance risks

Making Your Business Cyber Resilient

Cyber attacks are inevitable but they should not cause your business to suffer. Having an effective cyber resilient program in place will enable your business to continue even in the middle of a cyber attack. In the past few weeks the news has been awash regarding the security breach at Sony Pictures, which resulted in staff being instructed to use pen and p
Publish At:2014-12-12 16:10 | Read:15921 | Comments:0 | Tags:CISO Infrastructure Protection Risk Management Cyberattack r

Be Ready: Next Internet Bug Won’t Be The Last

BOSTON – Heartbleed, and the rash of Internet-wide bugs that will ultimately define security in 2014, tested the resilience of enterprises worldwide. In turn, resilience has been elevated as a major talking point for companies evaluating their preparedness for the inevitable next Heartbleed-type event in 2015 and beyond.Today at the Advanced Cyber Security C
Publish At:2014-11-06 02:45 | Read:10763 | Comments:0 | Tags:Vulnerabilities Web Security ACSC ACSC annual conference And


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud