HackDig : Dig high-quality web security articles for hackers

Video Conferencing Security for Businesses Isn’t a New Issue, It Just Came Into Focus

With 316 million Americans being asked to stay at home during the COVID-19 pandemic and nearly half of the U.S. population still working from home, video conferencing has suddenly become a critical tool for businesses. In fact, tools for remote work have spiked 84 percent since February, with video conferencing platforms like Webex recently sharing that they
Publish At:2020-06-01 07:09 | Read:211 | Comments:0 | Tags:Threat Research remote workforce Access Management Authentic

Stronger Together — Building Cyber Resilience

In January, the World Economic Forum (WEF) again included cyberattacks as one of the top 10 most likely and significant risks to society in 2020. Less than two months later, ways of working underwent a drastic change due to the global pandemic. With so many employees working remotely and many business functions now in the cloud, organizations are rethinking
Publish At:2020-06-01 07:09 | Read:224 | Comments:0 | Tags:CISO Incident Response Chief Information Security Officer (C

IBM Named a Leader in ‘The Forrester Wave™: Risk-Based Authentication, Q2 2020’

In today’s hybrid multicloud environment, users expect to be able to access their work and personal resources from wherever they are, whenever they need them. With this expanded security perimeter, and especially considering this year’s tectonic shift in remote work, organizations need to be prepared with a distributed security strategy that incorporates pri
Publish At:2020-05-27 15:11 | Read:174 | Comments:0 | Tags:Fraud Protection Identity & Access Risk Management Hybrid Cl

FTC Settles With Canadian Smart Lock Maker Over Security Practices

The Federal Trade Commission (FTC) has approved a settlement with Canadian smart lock maker Tapplock, which allegedly falsely claimed that its devices were designed to be “unbreakable.”Toronto-based Tapplock, Inc. is an Internet of Things (IoT) technology company that provides smart security solutions for both business and end-users alike. It sells Internet-
Publish At:2020-05-26 11:03 | Read:220 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Audits Compliance Risk Managemen

Free ImmuniWeb Tool Allows Organizations to Check Dark Web Exposure

Web security company ImmuniWeb this week announced a free tool that allows businesses and government organizations to check their dark web exposure.Integrated into ImmuniWeb’s Domain Security Test, the new feature provides organizations of all types with the option to check their current exposure by simply entering their main website URL.ImmuniWeb, which say
Publish At:2020-05-24 07:50 | Read:139 | Comments:0 | Tags:NEWS & INDUSTRY Risk Management Cybercrime Management &a

How Chatbots Can Help Bridge Business Continuity and Cybersecurity

A quick web search for “chatbots and security” brings up results warning you about the security risks of using these virtual agents. Dig a little deeper, however, and you’ll find that this artificial intelligence (AI) technology could actually help address many work-from-home cybersecurity challenges — such as secure end-to-end encryption a
Publish At:2020-05-24 06:18 | Read:178 | Comments:0 | Tags:Artificial Intelligence Identity & Access Risk Management Ac

Take a Bite Out of Sweyn

If you work in the healthcare industry, you may have heard about a family of vulnerabilities called “SweynTooth.” Researchers from Singapore first discovered the vulnerabilities in 2019. After waiting 90 days to announce them, which is part of the responsible disclosure process, they published a technical paper. If you are not familiar with the S
Publish At:2020-05-24 06:18 | Read:237 | Comments:0 | Tags:Application Security Healthcare Security Services Software &

Spotting the Gray Rhinos Charging Toward Your Business Continuity Posture

Preparing for the Unpredictable There may be some elephants in the board room from time to time, but what about Black Swans or Gray Rhinos? Many of us might be ignoring the warnings of risks to our business from “corporate Cassandras” — named for the priestess in Greek mythology who was cursed to pronounce true prophecies, but never to be believed. By unders
Publish At:2020-05-24 06:18 | Read:142 | Comments:0 | Tags:CISO Risk Management Business Continuity Chief Information S

The Connection Between Cloud Service Providers and Cyber Resilience

Organizations in both the private and public sectors have increasingly turned to cloud service providers (CSPs) to support their technical infrastructure, primarily to reduce IT costs and increase the efficiency of computing resources. In many cases, CSPs can also offer protection from security threats and increased cyber resilience — though customers often
Publish At:2020-05-24 06:18 | Read:229 | Comments:0 | Tags:Cloud Security Cloud Cloud Services Cloud Services Provider

Safeguard Sensitive Data With a Next-Generation Data Security Approach

There is no silver bullet when it comes to protecting sensitive data. No single security technology investment will eliminate the risk of data theft or a mistake exposing sensitive information. To proactively defend against attackers, enterprise security teams are learning that they need to collect and centralize security and compliance information from all
Publish At:2020-05-03 08:13 | Read:269 | Comments:0 | Tags:Data Protection Cloud Cloud Infrastructure Cloud Security Co

Ad Hoc or Managed Penetration Testing: Which One Is Best for You?

Penetration testing is no longer an extraordinary security engagement. Due to regulatory mandates, internal policies, business executive requests and the overall desire to avoid becoming the next breach victim, testing is now commonplace among many organizations. The kind of testing, however, can still be a question. Do you need ad hoc testing, that as-neede
Publish At:2020-05-03 08:13 | Read:316 | Comments:0 | Tags:Application Security Data Protection Risk Management Securit

Hackers Knew How to Target PLCs in Israel Water Facility Attacks: Sources

The actions of the hackers who recently targeted water facilities in Israel show their sophistication and prove that they knew exactly what they were doing, according to people with knowledge of the attacks.The Israeli government revealed recently that several water and wastewater facilities across the country were targeted in a coordinated attack on April 2
Publish At:2020-05-03 07:46 | Read:358 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY SCADA / ICS Virus & Thr

COVID-19 Lockdown Fuels Increase in RDP Attacks

The number of attacks abusing the remote desktop protocol (RDP) to compromise corporate environments has increased significantly over the past couple of months, Kaspersky reports.With employees worldwide forced to work from home due to the current COVID-19 pandemic, the volume of corporate traffic has increased significantly, just as the use of third-party s
Publish At:2020-05-03 07:46 | Read:364 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Identity & Acces

Achieve Flexibility in Business Through Digital Trust and Risk Management

I grew up watching professional football back in the 70s, when defenses were so good they had their own nicknames. The Pittsburgh Steelers had the “Steel Curtain,” the Miami Dolphins had the “No-Name Defense” and the Dallas Cowboys had the “Doomsday Defense.” The Cowboys’ defense was based on a newfangled concept cal
Publish At:2020-04-21 10:39 | Read:652 | Comments:0 | Tags:CISO digital trust Business Continuity Customer Experience D

Breach-and-Attack Simulation Firm SafeBreach Raises $19 Million

SafeBreach has raised a further $19 million to improve and expand its breach-and-attack simulation platform, which allows customers to assess their security posture against a continuous barrage of genuine, but safe, hacker behaviors.Sunnyvale, Calif-based breach-and-attack simulation (BAS) firm SafeBreach has raised $19 million in a Series C funding round le
Publish At:2020-04-15 14:31 | Read:595 | Comments:0 | Tags:NEWS & INDUSTRY Risk Management

Announce

Share high-quality web security related articles with you:)

Tools