HackDig : Dig high-quality web security articles for hackers

ENISA released a Tool to map dependencies to International Standards

The European Agency for Cybersecurity ENISA has released a tool for the mapping of international security standards to interdependencies’ indicators. ENISA has released a tool for the mapping of international security standards to interdependencies’ indicators that have been introduced and demonstrated in the report Good practices on interdependencies bet
Publish At:2020-04-06 17:16 | Read:627 | Comments:0 | Tags:Breaking News Security ENISA information security news it se

Inadvertent Insider Threats Present a Unique Challenge to Organizations

According to the recent X-Force Threat Intelligence Index 2020, more than 8.5 billion records were exposed due to breaches in 2019, of which 86 percent were due to misconfigured assets. These issues affected only half of the records breached in 2018, and as the 2017 report stated, 70 percent of the 2.9 billion records lost that year were due to misconfigurat
Publish At:2020-03-13 11:46 | Read:785 | Comments:0 | Tags:CISO Cloud Security Cloud Cloud Services Cloud Services Prov

Safeguarding Healthcare for the Future With Zero Trust Security

In 2019, we saw a record number of information security breaches. According to the IBM X-Force Threat Intelligence Index 2020, a total of 8.5 billion records were compromised — three times the number from 2018. The healthcare industry saw its fair share of attacks and was the 10th-most targeted industry, accounting for 3 percent of all attacks last year. Th
Publish At:2020-03-11 08:47 | Read:611 | Comments:0 | Tags:Healthcare Identity & Access Access Management Advanced Pers

To Be or Not to Be: BCSI in the Cloud?

With regard to BCSI (BES (Bulk Electric System) Cyber System Information) in the cloud, responsible entity sentiments at the moment may be akin to Prince Hamlet as he contemplated death and suicide, “bemoaning the pain and unfairness of life but acknowledging that the alternative might be worse.”As currently written and subject to enforcement, components of
Publish At:2020-03-08 23:43 | Read:538 | Comments:0 | Tags:Cloud BCSI Risk Assessment

Measuring Security Risk in a Medical IoT World

The medical internet of things (IoT) is no longer a futuristic concept. It is here today, and it includes devices you may have never considered a part of the patient care ecosystem, such as elevators, beds, exit signs and clocks. Between those operational technologies and the devices the U.S. Food and Drug Administration (FDA) has already deemed critical, th
Publish At:2020-03-04 09:51 | Read:596 | Comments:0 | Tags:Endpoint Healthcare Risk Management Security Services IoT Co

A Guide to Easy and Effective Threat Modeling

Threat modeling is a process by which potential threats can be identified, enumerated and prioritized, all from a hypothetical attacker’s point of view. The purpose of threat modeling is to provide defenders with a systematic analysis of the probable attacker’s profile, the most likely attack vectors and the assets most desired by an attacker. Ef
Publish At:2020-02-27 09:41 | Read:729 | Comments:0 | Tags:Application Security Security Intelligence & Analytics Appli

To Rank or Not to Rank Should Never Be a Question

Let’s face it: Vulnerability management is not what it used to be a decade ago. Actually, it is not what it used to be a couple of years ago. Vulnerability management is one of those ever-evolving processes. Whether it is because of compliance mandates, board demands, an overall desire to reduce risk, all of these objectives or none, almost every organ
Publish At:2020-02-20 10:49 | Read:681 | Comments:0 | Tags:Endpoint Risk Management Software & App Vulnerabilities Clou

What Cybersecurity Professionals Do Versus What Our Coworkers Think We Do

We’ve probably all seen that “perception versus fact” meme where there’s an assortment of pictures with captions like “what my family thinks I do,” “what my boss thinks I do,” “what I think I do” and “what I actually do.” People’s understanding of what cybersecurity professionals d
Publish At:2019-10-18 10:20 | Read:1350 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) National Cybe

5 Must-Haves for Your Next Managed Security Services Provider (MSSP)

Business environments are forcing organizations to rapidly evolve. Security and risk leaders are realizing that a modern security strategy requires dramatic changes to program governance, technology and execution. Yet many organizations managing their own security program can’t keep pace and lack the specialized skills and competencies needed to cost-e
Publish At:2019-10-18 10:20 | Read:1452 | Comments:0 | Tags:CISO Security Services Managed Security Services (MSS) Manag

Open Banking Is Here — Is Your Bank Positioned to Lead?

Banking is set to significantly change as Payment System Directive 2 (PSD2) regulations are introduced across Europe. In fact, open banking regulations are being considered in a number of regions around the world. The directives will require financial institutions to adopt open banking by safely and securely allowing customers to view account information and
Publish At:2017-11-01 18:45 | Read:6071 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Risk Managemen

Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

When things go wrong with computer systems and networks, whether due to ordinary mishaps or malicious actors, the organizations that rely on those systems and networks are put at risk. They may suffer direct financial losses, reputational damage or both, with effects ranging from inconvenience to total loss and liquidation of the enterprise. Understanding th
Publish At:2017-10-05 16:00 | Read:4713 | Comments:0 | Tags:Risk Management Executives Risk risk analysis Risk Assessmen

See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management

The art and science known as risk management has been around for years. It is applied in a broad array of areas, including insurance, credit risk ratings, stock and other market risk ratings, foreign policy decisions, military responses and many others. The true irony is that, although risk management has been applied to many aspects of IT, such as change ma
Publish At:2017-09-14 21:10 | Read:4881 | Comments:0 | Tags:Data Protection Risk Management Data Breach Data Management

Risk Governance: The True Secret Weapon of Cybersecurity

This season’s featured cybersecurity nightmare may be ransomware, but breaches of all kinds are going up in both numbers and cost. In response, security vendors are offering sophisticated — and costly — solutions to defend against evermore sophisticated attackers. However, the most effective protective measures have nothing to do with specific software
Publish At:2017-09-08 10:00 | Read:5717 | Comments:0 | Tags:Risk Management Access Governance Access Management Cybercri

Is Your Company Secure by Design? Aligning Security With Business Objectives

The principle of security by design suggests that security needs to be aligned with business objectives. But what, exactly, does that mean and where should security professionals start? Below are some factors to consider when aligning security with business objectives. Best Practices for Aligning Security With Business Objectives First and foremost, give
Publish At:2017-09-07 15:10 | Read:5116 | Comments:0 | Tags:Security Intelligence & Analytics Incident Response (IR) Ris

Shrink Your Enterprise Cloud Computing Security Concerns With a Cloud Vendor Risk Management Program

According to a recent Forrester report, enterprise cloud computing adoption accelerated in 2016 and will do so again in 2017. Software-as-a-service (SaaS) remains the largest portion of the public cloud market, with global spending expected to reach $105 billion in 2017 and $155 billion by 2020. Infrastructure-as-a-service (IaaS) and platform-as-a-service (
Publish At:2017-08-22 09:30 | Read:5225 | Comments:0 | Tags:Cloud Security Risk Management Cloud Cloud Adoption Cloud Co

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud