HackDig : Dig high-quality web security articles for hacker

What Can We Learn From the ‘Global State of Information Security Survey 2018’?

In October 2018, PricewaterhouseCoopers (PwC) released the latest edition of “The Global State of Information Security Survey.” For this report, the professional services firm surveyed over 9,000 leaders, including CEOs, chief financial officers (CFOs), chief information officer (CIOs) and chief information security officers (CISOs), from 122 cou
Publish At:2017-11-02 13:10 | Read:451 | Comments:0 | Tags:Risk Management Chief Information Officer (CIO) Chief Inform

Diving Deeper to Understand, Investigate and Mitigate Cyberthreats

As recent attacks targeting sensitive, personal information at a number of high-profile institutions have demonstrated, it is not a matter of if, but when you will have to investigate a security breach. The law enforcement and intelligence communities are increasingly called upon to investigate and mitigate cyberthreats, often applying the same tools and met
Publish At:2017-11-02 13:10 | Read:289 | Comments:0 | Tags:Incident Response Risk Management Forensics Incident Forensi

Open Banking Is Here — Is Your Bank Positioned to Lead?

Banking is set to significantly change as Payment System Directive 2 (PSD2) regulations are introduced across Europe. In fact, open banking regulations are being considered in a number of regions around the world. The directives will require financial institutions to adopt open banking by safely and securely allowing customers to view account information and
Publish At:2017-11-01 18:45 | Read:280 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Risk Managemen

Nine More NCSAM Tips for Cybersecurity Professionals: Week Four

What have you learned during National Cybersecurity Awareness Month (NCSAM) that could help drive change in your organization? We’ve featured 22 tips so far, so there should be at least a few things for you to work on. Maybe your company needs to revamp its cybersecurity training or do a better job managing data. As with anything in life, there is alwa
Publish At:2017-11-01 00:20 | Read:393 | Comments:0 | Tags:Risk Management Cybersecurity IBM IBM Security National Cybe

Addressing the Clear and Present Danger of an Electrical Power Grid Breach

Power grids are a tantalizing targets for sophisticated attackers. In the U.S., every major economic sector relies heavily on electricity. That dependence includes the military as well. Given the rising threat levels, it isn’t surprising that there are calls for the Department of Defense to ends its reliance on the power grid for key military installat
Publish At:2017-10-31 05:50 | Read:200 | Comments:0 | Tags:Energy & Utility Risk Management Access Management Energy an

Employees Must Wash Hands: 11 Tips to Translate Awareness Into Better Security Hygiene

Are you security-aware? A lot more people today are answering yes than in previous years. Perhaps it’s because of their organizations’ own security awareness efforts, or maybe it’s due to the influx of news stories about ransomware, credit card hacks, data breaches and identity theft. If people are more aware of cybersecurity concerns, does
Publish At:2017-10-26 01:10 | Read:376 | Comments:0 | Tags:CISO Risk Management Cybersecurity Training Education Nation

Don’t Just Put Out the Zero-Day Fire — Get Rid of the Fuel

How often have you heard a co-worker say that he or she had to put out a fire? Depending on your job role, you may have anywhere from one to more than a dozen so-called fires weekly. A zero-day vulnerability is an example of a work-related fire that a security operations analyst might have to extinguish. Enterprises should be prepared to handle zero-day fir
Publish At:2017-10-22 05:00 | Read:378 | Comments:0 | Tags:Advanced Threats Endpoint Risk Management Software & App Vul

Five Key IT Security Best Practices to Safeguard Your Expanding Business

A key theme of the recent Cybersecurity Nexus event in Washington, D.C. was the growing need for small and medium-sized businesses (SMBs) to adopt enterprise-like IT security best practices. In fact, SMBs might actually have an edge over the unrelenting competition they endure from larger enterprises because they are more proactive and nimbler in mitigating
Publish At:2017-10-22 05:00 | Read:226 | Comments:0 | Tags:Application Security Retail Risk Management Application Secu

How to Increase Transparency and Rebuild Trust After a Data Breach

As more companies suffer breaches and leak private data online, it becomes harder for organizations to be transparent and establish trust with their customers. Recent incidents have shown that many experts underestimated the total impact of a data breach in terms of the actual number of users affected and the volume of data made public. Many companies take t
Publish At:2017-10-22 05:00 | Read:538 | Comments:0 | Tags:Application Security Data Protection Incident Response Data

Sink or Swim: Uniting the C-Suite, Sales and Security to Fight Advanced Cyberattacks

One of the most disturbing security trends over the last few years has been the rise of the meta attack. The scope of this type of attack is far larger and wider than a threat designed to achieve a specific goal. These advanced cyberattacks are so significant, in fact, that they could sink an entire organization if it doesn’t take the time to install l
Publish At:2017-10-06 10:25 | Read:303 | Comments:0 | Tags:CISO Incident Response Risk Management Advanced Attacks Adva

Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl

As organizations march into the digital age, data sprawl is accelerating. Information of all kinds is stored everywhere, accessed by multiple people many times a day and shared across corporate and international boundaries. Most organizations do not have a handle on data locations, ownership and flows outside of regulated or compliance-related information. T
Publish At:2017-10-05 16:00 | Read:458 | Comments:0 | Tags:Data Protection Critical Data Crown Jewels Data Breach Data

Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

When things go wrong with computer systems and networks, whether due to ordinary mishaps or malicious actors, the organizations that rely on those systems and networks are put at risk. They may suffer direct financial losses, reputational damage or both, with effects ranging from inconvenience to total loss and liquidation of the enterprise. Understanding th
Publish At:2017-10-05 16:00 | Read:500 | Comments:0 | Tags:Risk Management Executives Risk risk analysis Risk Assessmen

Fasten Your Seat Belt: Accelerating Your Digital Transformation Through Collaboration

When I think about my family vacations from childhood, I remember camping trips, hours on the beach, sharing stories around the campfire and the fun my siblings and I used to have in the back seat of the car — jumping on each other, switching seats and hopping from the third row into the front seat. Half the fun was enabled by the fact that we had no seat be
Publish At:2017-10-04 21:35 | Read:260 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Cyber

Basic Security Tools You Cannot Afford to Miss in Your Risk Management Program

Risk management is the process of identifying, assessing and controlling threats to an organization. It is also a way to increase the security maturity of an organization. Risk management allows you to think about security more strategically and answer the questions that come from your company board, such as: How many times was the organization attacked? Is
Publish At:2017-10-03 08:40 | Read:625 | Comments:0 | Tags:CISO Incident Response Risk Management Incident Management I

Cybersecurity Strategy, Risk Management and List Making

When confronted with the daunting task of developing a cybersecurity strategy, many people don’t know where to start. The quick answer is to make a list of the tasks required to accomplish the project, organize them by functional categories and determine what resources need to be brought together to accomplish the tasks on the list. This might seem lik
Publish At:2017-10-03 08:40 | Read:493 | Comments:0 | Tags:CISO Government Risk Management Cybersecurity Cybersecurity

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud