HackDig : Dig high-quality web security articles for hacker

Effective Data Security Begins With a Strong Tech Foundation

Data is the engine of the modern economy. Whether it consists of customer data, intellectual property, market insights or financial information, these types of sensitive data enable the most successful businesses to thrive. It’s no surprise, then, that securing that critical data is increasingly a strategic priority for organizations around the globe.
Publish At:2020-03-31 08:26 | Read:66 | Comments:0 | Tags:CISO Data Protection Chief Information Officer (CIO) Chief I

Public ICS Hacking Tools Make It Easier to Launch Attacks: FireEye

Publicly available hacking tools, many of which have been developed for research and testing purposes, lower the bar for threat actors looking to target industrial control systems (ICS) and operational technology (OT) networks, FireEye warned this week.The cybersecurity firm told SecurityWeek that its Mandiant Intelligence team tracks nearly 100 tools that c
Publish At:2020-03-25 09:30 | Read:155 | Comments:0 | Tags:NEWS & INDUSTRY SCADA / ICS Virus & Threats Risk Man

TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany

IBM X-Force researchers recently analyzed an Android malware app that’s likely being pushed to infected users by the TrickBot Trojan. This app, dubbed “TrickMo” by our team, is designed to bypass strong authentication methods that bank customers use when they need to authorize a transaction. Though it’s not the first of its kind, this
Publish At:2020-03-24 07:55 | Read:183 | Comments:0 | Tags:Advanced Threats Risk Management Threat Intelligence Android

Do You Know Your Responsibilities When It Comes to Container Security?

As you migrate your enterprise to the public cloud or multicloud, you want to realize some of its inherent benefits regardless of what service model you utilize. Whether your goal is cost optimization, scalability or elasticity, the cloud can allow your enterprise to adopt newer, cutting-edge technologies to innovate your business without the burden of havin
Publish At:2020-03-24 07:55 | Read:211 | Comments:0 | Tags:Cloud Security Application Development Application Security

Extend Your Security Team, Quickly Add Expertise and Help Secure Your Remote Workforce

Organizations around the world are adapting to respond to the impact of the novel coronavirus (COVID-19). Companies may experience increased stress and challenges across their security programs arising from increased remote user demand, site availability impacts, stringent travel restrictions and requests for social distancing. Security organizations may als
Publish At:2020-03-23 14:33 | Read:125 | Comments:0 | Tags:Endpoint Risk Management Security Services Endpoint Protecti

Crypto-Risk: Your Data Security Blind Spot

For many years — almost since the beginning of secure internet communications — data security professionals have had to face the challenge of using certificates, the mechanism that forms the basis of Transport Layer Security (TLS) communications. Certificates facilitate secure connections to websites (represented by the “s” in “https”
Publish At:2020-03-23 10:45 | Read:152 | Comments:0 | Tags:Data Protection Risk Management Apple Business Continuity Ce

7 Spring Cleaning Tasks to Improve Data Security

This year, March 19 ushered in spring in the Northern Hemisphere — the first time since 1896 that the season has started so early. So why not take advantage of the season’s early arrival to do some spring cleaning, not only of your physical space, but of your data and systems, too? Digital spring cleaning can make your life easier and dramatically impr
Publish At:2020-03-20 10:40 | Read:179 | Comments:0 | Tags:Data Protection Mobile Security Application Security Cloud C

4 Principles That Should Define Your Evolving Security Operations Model

I recently had the opportunity to speak at a security conference where I presented the operating models that an organization can embrace when managing cyberthreats and the guiding principles associated with them. It was a great chance to share some of my experiences with the greater community and foster intellectual curiosity around an increasingly important
Publish At:2020-03-20 09:20 | Read:147 | Comments:0 | Tags:CISO Risk Management Security Services Cloud Security Cybert

NIST, DHS Publish Guidance on Securing Virtual Meetings, VPNs

With people worldwide forced to work from home due to the coronavirus epidemic, NIST and DHS published a series of recommendations on how to ensure that virtual meetings and connections to enterprise networks are protected from prying eyes.Conference calls and web meetings have long been part of modern work, as they play a vital role in ensuring the necessar
Publish At:2020-03-19 10:49 | Read:178 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Virus & Threats Iden

2020 Tax Fraud Trends: How to Protect Yourself at Home and Work

The tax season deadline in the U.S. is April 15, 2020, and that means scammers are officially on the prowl for unsuspecting tax fraud victims. Attackers are utilizing both time-tested and new techniques to collect tax information and personal data from victims and target individual and corporate accounts. No one is immune from tax season risks, and most of u
Publish At:2020-03-17 10:37 | Read:226 | Comments:0 | Tags:Fraud Protection Bank Fraud Email Fraud Fraud Schemes Identi

Inadvertent Insider Threats Present a Unique Challenge to Organizations

According to the recent X-Force Threat Intelligence Index 2020, more than 8.5 billion records were exposed due to breaches in 2019, of which 86 percent were due to misconfigured assets. These issues affected only half of the records breached in 2018, and as the 2017 report stated, 70 percent of the 2.9 billion records lost that year were due to misconfigurat
Publish At:2020-03-13 11:46 | Read:346 | Comments:0 | Tags:CISO Cloud Security Cloud Cloud Services Cloud Services Prov

U.S. Senators Seek to Ban TikTok on Government Devices

Sen. Josh Hawley (R-MO) and Sen. Rick Scott (R-FL) this week introduced a bill aimed at banning the use of the China-made TikTok application on government devices.Referred to as the “No TikTok on Government Devices Act,” the new legislation would prevent government employees, diplomats, and politicians from downloading or using TikTok or other applications f
Publish At:2020-03-13 10:40 | Read:309 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Application Security Com

Tech Must Be Treated Like Tobacco, Says Facebook Whistleblower

Facebook and other tech companies need to be regulated like the tobacco industry, warned Christopher Wylie, the whistleblower who exposed the Cambridge Analytica scandal.The data scientist revealed how he helped the disgraced company, founded by Donald Trump's former right-hand man Steve Bannon, to use unauthorised personal data harvested from Facebook to he
Publish At:2020-03-12 09:25 | Read:326 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Compliance Risk Management Priva

Securing the MSP: best practices for vetting cybersecurity vendors

Ironically, to keep costs low for their enterprise and mid-market clients, managed service providers (MSPs) are some of the most reliant on third-party vendors—including those providing security. While this is generally not an indication of dysfunction or vulnerability, the responsible MSP will be looking with a critical eye while vetting cybersecurity vendo
Publish At:2020-03-11 13:20 | Read:308 | Comments:0 | Tags:Business cybersecurity vendors enterprise managed service pr

In 2020, IoT Security Must Be Part of Your Threat Management Strategy

Internet-enabled devices are emerging more and more in business and personal environments. Often going unnoticed, they simply appear within network infrastructures, using wired or wireless connections and expanding the enterprise attack surface. In fact, enterprises nowadays likely have more internet of things (IoT) devices on their networks than traditiona
Publish At:2020-03-10 10:01 | Read:307 | Comments:0 | Tags:CISO IoT Connected Devices Internet of Things (IoT) IoT Secu

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud