HackDig : Dig high-quality web security articles for hackers

Three Approaches to Cybersecurity Planning for Post-Pandemic Cloud Adoption

The global pandemic has been dictating how the whole world is reforming, businesses included. Different forums and analyst reports are increasingly calling out the future of businesses as they are moving their workloads to the cloud gradually. IDC “expects 2021 to be the year of multi-cloud” as the global COVID-19 pandemic reinforces the need for business to
Publish At:2020-06-24 11:06 | Read:162 | Comments:0 | Tags:Cloud Security Risk Management Cloud Adoption Cybersecurity

Achieve Flexibility in Business Through Digital Trust and Risk Management

I grew up watching professional football back in the 70s, when defenses were so good they had their own nicknames. The Pittsburgh Steelers had the “Steel Curtain,” the Miami Dolphins had the “No-Name Defense” and the Dallas Cowboys had the “Doomsday Defense.” The Cowboys’ defense was based on a newfangled concept cal
Publish At:2020-04-21 10:39 | Read:652 | Comments:0 | Tags:CISO digital trust Business Continuity Customer Experience D

The State of the Cybersecurity Market: Where We’ve Come, Where We’re Going

There’s an interesting trend that I have personally noticed over the past few years: organizations are starting to take cybersecurity more seriously. With the multitude of high-profile data breaches, organizations are starting to realize that cybersecurity is a significant risk to the business. This allows CISOs and other similar titles with leadership respo
Publish At:2020-03-16 23:05 | Read:521 | Comments:0 | Tags:Cyber Security CISO cybersecurity risk

Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

The traditional threat landscape comprised of conventional IT assets is difficult enough to protect, detect and respond to, but the landscape seems to be quickly expanding beyond traditional IT. Those new domains are operational technology (OT), the internet of things (IoT) and the internet of medical things (IoMT). Devices from non-traditional IT environmen
Publish At:2020-03-04 13:39 | Read:580 | Comments:0 | Tags:Endpoint Energy & Utility Healthcare Threat Intelligence NIS

Measuring Security Risk in a Medical IoT World

The medical internet of things (IoT) is no longer a futuristic concept. It is here today, and it includes devices you may have never considered a part of the patient care ecosystem, such as elevators, beds, exit signs and clocks. Between those operational technologies and the devices the U.S. Food and Drug Administration (FDA) has already deemed critical, th
Publish At:2020-03-04 09:51 | Read:783 | Comments:0 | Tags:Endpoint Healthcare Risk Management Security Services IoT Co

Scalable Data Protection Is Critical to Support Data Privacy

Modern privacy regulations are founded on a variety of principles going back to 1890 that sought to protect citizens from “yellow journalism.” Over the following years, governments enacted legislation that sought to respect an individual’s right to privacy, including their image and their correspondence. Following an uptick in data breache
Publish At:2020-02-26 10:55 | Read:750 | Comments:0 | Tags:Data Protection Automation Compliance Data Privacy Forrester

X-Force Threat Intelligence Index Reveals Top Cybersecurity Risks of 2020

The volume of threats that security teams see on a daily basis can make it especially difficult to look at the big picture when it comes to developing an effective cybersecurity strategy. To see through the flood of data and alerts, organizations depend on actionable threat intelligence to help them understand and mitigate risks. Looking at long-term trends
Publish At:2020-02-11 08:51 | Read:772 | Comments:0 | Tags:Advanced Threats Threat Intelligence Cloud Cloud Adoption Cl

Gaining Insight Into the Ponemon Institute’s 2020 Cost of Insider Threats Report

Today, I’m pleased to share some of the key findings from the 2020 Cost of Insider Threats Global Report. This is the third benchmark study, independently sponsored by IBM Security and ObserveIT to help understand the direct and indirect costs that result from insider threats. The first study was conducted in 2016 and focused exclusively on companies i
Publish At:2020-02-09 10:30 | Read:463 | Comments:0 | Tags:CISO Security Services Access Management Breach Credentials

Biased AI Is Another Sign We Need to Solve the Cybersecurity Diversity Problem

Artificial intelligence (AI) excels at finding patterns like unusual human behavior or abnormal incidents. It can also reflect human flaws and inconsistencies, including 180 known types of bias. Biased AI is everywhere, and like humans, it can discriminate against gender, race, age, disability and ideology. AI bias has enormous potential to negatively affect
Publish At:2020-02-09 10:30 | Read:592 | Comments:0 | Tags:Artificial Intelligence CISO Artificial Intelligence (AI) Co

Security Engineering – A manifesto for defensive security

Presentation on the need to re-examine how we engineer systems (taking service providers as an example) and the implications on how we quantify cyber risk if we want to take this message into the board room (as given at BT’s SnoopCon 2019 and Cisco’s June 2019 Knowledge Network webinar for service providers). Having delivered security consultancy
Publish At:2019-09-19 17:35 | Read:1057 | Comments:0 | Tags:Presentations C-Suite conference CRQ cyber risk quantificati

Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl

As organizations march into the digital age, data sprawl is accelerating. Information of all kinds is stored everywhere, accessed by multiple people many times a day and shared across corporate and international boundaries. Most organizations do not have a handle on data locations, ownership and flows outside of regulated or compliance-related information. T
Publish At:2017-10-05 16:00 | Read:5461 | Comments:0 | Tags:Data Protection Critical Data Crown Jewels Data Breach Data

Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

When things go wrong with computer systems and networks, whether due to ordinary mishaps or malicious actors, the organizations that rely on those systems and networks are put at risk. They may suffer direct financial losses, reputational damage or both, with effects ranging from inconvenience to total loss and liquidation of the enterprise. Understanding th
Publish At:2017-10-05 16:00 | Read:4911 | Comments:0 | Tags:Risk Management Executives Risk risk analysis Risk Assessmen

Fasten Your Seat Belt: Accelerating Your Digital Transformation Through Collaboration

When I think about my family vacations from childhood, I remember camping trips, hours on the beach, sharing stories around the campfire and the fun my siblings and I used to have in the back seat of the car — jumping on each other, switching seats and hopping from the third row into the front seat. Half the fun was enabled by the fact that we had no seat be
Publish At:2017-10-04 21:35 | Read:3522 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Cyber

Basic Security Tools You Cannot Afford to Miss in Your Risk Management Program

Risk management is the process of identifying, assessing and controlling threats to an organization. It is also a way to increase the security maturity of an organization. Risk management allows you to think about security more strategically and answer the questions that come from your company board, such as: How many times was the organization attacked? Is
Publish At:2017-10-03 08:40 | Read:5388 | Comments:0 | Tags:CISO Incident Response Risk Management Incident Management I

Cybersecurity Strategy, Risk Management and List Making

When confronted with the daunting task of developing a cybersecurity strategy, many people don’t know where to start. The quick answer is to make a list of the tasks required to accomplish the project, organize them by functional categories and determine what resources need to be brought together to accomplish the tasks on the list. This might seem lik
Publish At:2017-10-03 08:40 | Read:4896 | Comments:0 | Tags:CISO Government Risk Management Cybersecurity Cybersecurity

Announce

Share high-quality web security related articles with you:)

Tools