HackDig : Dig high-quality web security articles

Taking the Risk Out of Mergers and Acquisitions

In the post-COVID-19 economy, cyber risk and cybersecurity will play a central role in unlocking mergers and acquisitions (M&A) deal valuations. While economic uncertainty has contributed to a decline in M&A activity in the first half of 2020, many analysts expect an increase in deals during 2020-21 based on several conditions. The Mergers and Acqui
Publish At:2020-09-30 12:45 | Read:740 | Comments:0 | Tags:Banking & Financial Services CISO Risk Management Security S

Video Conferencing Security Tips You May Have Overlooked

Video conferencing applications grew substantially following the outbreak of the coronavirus (COVID-19) global pandemic. According to Research and Markets article “Video Conferencing Demand Rises due to Social-Distancing,” video conferencing software experienced 62 million downloads in March 2020. This increase in use resulted from businesses ado
Publish At:2020-07-08 10:58 | Read:1227 | Comments:0 | Tags:Data Protection Risk Management Software & App Vulnerabiliti

Three Approaches to Cybersecurity Planning for Post-Pandemic Cloud Adoption

The global pandemic has been dictating how the whole world is reforming, businesses included. Different forums and analyst reports are increasingly calling out the future of businesses as they are moving their workloads to the cloud gradually. IDC “expects 2021 to be the year of multi-cloud” as the global COVID-19 pandemic reinforces the need for business to
Publish At:2020-06-24 11:06 | Read:1296 | Comments:0 | Tags:Cloud Security Risk Management Cloud Adoption Cybersecurity

ENISA released a Tool to map dependencies to International Standards

The European Agency for Cybersecurity ENISA has released a tool for the mapping of international security standards to interdependencies’ indicators. ENISA has released a tool for the mapping of international security standards to interdependencies’ indicators that have been introduced and demonstrated in the report Good practices on interdependencies bet
Publish At:2020-04-06 17:16 | Read:1930 | Comments:0 | Tags:Breaking News Security ENISA information security news it se

Inadvertent Insider Threats Present a Unique Challenge to Organizations

According to the recent X-Force Threat Intelligence Index 2020, more than 8.5 billion records were exposed due to breaches in 2019, of which 86 percent were due to misconfigured assets. These issues affected only half of the records breached in 2018, and as the 2017 report stated, 70 percent of the 2.9 billion records lost that year were due to misconfigurat
Publish At:2020-03-13 11:46 | Read:2076 | Comments:0 | Tags:CISO Cloud Security Cloud Cloud Services Cloud Services Prov

Safeguarding Healthcare for the Future With Zero Trust Security

In 2019, we saw a record number of information security breaches. According to the IBM X-Force Threat Intelligence Index 2020, a total of 8.5 billion records were compromised — three times the number from 2018. The healthcare industry saw its fair share of attacks and was the 10th-most targeted industry, accounting for 3 percent of all attacks last year. Th
Publish At:2020-03-11 08:47 | Read:2195 | Comments:0 | Tags:Healthcare Identity & Access Access Management Advanced Pers

To Be or Not to Be: BCSI in the Cloud?

With regard to BCSI (BES (Bulk Electric System) Cyber System Information) in the cloud, responsible entity sentiments at the moment may be akin to Prince Hamlet as he contemplated death and suicide, “bemoaning the pain and unfairness of life but acknowledging that the alternative might be worse.”As currently written and subject to enforcement, components of
Publish At:2020-03-08 23:43 | Read:2234 | Comments:0 | Tags:Cloud BCSI Risk Assessment

Measuring Security Risk in a Medical IoT World

The medical internet of things (IoT) is no longer a futuristic concept. It is here today, and it includes devices you may have never considered a part of the patient care ecosystem, such as elevators, beds, exit signs and clocks. Between those operational technologies and the devices the U.S. Food and Drug Administration (FDA) has already deemed critical, th
Publish At:2020-03-04 09:51 | Read:1965 | Comments:0 | Tags:Endpoint Healthcare Risk Management Security Services IoT Co

A Guide to Easy and Effective Threat Modeling

Threat modeling is a process by which potential threats can be identified, enumerated and prioritized, all from a hypothetical attacker’s point of view. The purpose of threat modeling is to provide defenders with a systematic analysis of the probable attacker’s profile, the most likely attack vectors and the assets most desired by an attacker. Ef
Publish At:2020-02-27 09:41 | Read:2092 | Comments:0 | Tags:Application Security Security Intelligence & Analytics Appli

To Rank or Not to Rank Should Never Be a Question

Let’s face it: Vulnerability management is not what it used to be a decade ago. Actually, it is not what it used to be a couple of years ago. Vulnerability management is one of those ever-evolving processes. Whether it is because of compliance mandates, board demands, an overall desire to reduce risk, all of these objectives or none, almost every organ
Publish At:2020-02-20 10:49 | Read:1926 | Comments:0 | Tags:Endpoint Risk Management Software & App Vulnerabilities Clou

What Cybersecurity Professionals Do Versus What Our Coworkers Think We Do

We’ve probably all seen that “perception versus fact” meme where there’s an assortment of pictures with captions like “what my family thinks I do,” “what my boss thinks I do,” “what I think I do” and “what I actually do.” People’s understanding of what cybersecurity professionals d
Publish At:2019-10-18 10:20 | Read:2681 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) National Cybe

5 Must-Haves for Your Next Managed Security Services Provider (MSSP)

Business environments are forcing organizations to rapidly evolve. Security and risk leaders are realizing that a modern security strategy requires dramatic changes to program governance, technology and execution. Yet many organizations managing their own security program can’t keep pace and lack the specialized skills and competencies needed to cost-e
Publish At:2019-10-18 10:20 | Read:2734 | Comments:0 | Tags:CISO Security Services Managed Security Services (MSS) Manag

Open Banking Is Here — Is Your Bank Positioned to Lead?

Banking is set to significantly change as Payment System Directive 2 (PSD2) regulations are introduced across Europe. In fact, open banking regulations are being considered in a number of regions around the world. The directives will require financial institutions to adopt open banking by safely and securely allowing customers to view account information and
Publish At:2017-11-01 18:45 | Read:7411 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Risk Managemen

Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

When things go wrong with computer systems and networks, whether due to ordinary mishaps or malicious actors, the organizations that rely on those systems and networks are put at risk. They may suffer direct financial losses, reputational damage or both, with effects ranging from inconvenience to total loss and liquidation of the enterprise. Understanding th
Publish At:2017-10-05 16:00 | Read:6143 | Comments:0 | Tags:Risk Management Executives Risk risk analysis Risk Assessmen

See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management

The art and science known as risk management has been around for years. It is applied in a broad array of areas, including insurance, credit risk ratings, stock and other market risk ratings, foreign policy decisions, military responses and many others. The true irony is that, although risk management has been applied to many aspects of IT, such as change ma
Publish At:2017-09-14 21:10 | Read:6104 | Comments:0 | Tags:Data Protection Risk Management Data Breach Data Management