HackDig : Dig high-quality web security articles

Major Database Security Threats & How You Can Prevent Them

Organizations and businesses must use a range of measures, protocols, and tools to protect their databases from cybercriminals. If breached, malicious actors can gain access to sensitive information that they can use for financial gain. Security teams must adapt and constantly improve to protect against ever-evolving security threats, and maintain the integr
Publish At:2022-09-25 23:54 | Read:7558 | Comments:0 | Tags:Featured Articles Security Controls Vulnerability Management

Strong Authentication Considerations for Digital, Cloud-First Businesses

Authentication as a baseline security control is essential for organizations to know who and what is accessing corporate resources and assets.  The Cybersecurity and Infrastructure Security Agency (CISA) states that authentication is the process of verifying that a user’s identity is genuine.In this climate of advanced cyber threats and motivated cyber
Publish At:2022-09-14 23:53 | Read:69718 | Comments:0 | Tags:Featured Articles Security Controls Authentication MFA multi

How Penetration Testing can help prevent Ransomware Attacks

It is hard to believe, but ransomware is more than three decades old.  While many would think that the ransomware mayhem started with the WannaCry attack of 2017, that is simply the most publicized example. Since then, dozens of ransomware strains have been utilized in a variety of cyberattacks.According to a PhishLabs report, by HelpSystems, ransomware
Publish At:2022-09-07 23:53 | Read:61791 | Comments:0 | Tags:Featured Articles Security Controls penetration testing pent

Supply Chain Cybersecurity – the importance of everyone

This week, I spoke with a new client who told me all about how they are looking forward to addressing a number of internal issues surrounding their IT systems. They explained that over the last 12 months, they repeatedly had issues of delays in service and outages, which had affected their business.Discussing this further, I explored their relationship with
Publish At:2022-08-12 01:07 | Read:42716 | Comments:0 | Tags:Featured Articles Security Controls cybersecurity data secur

How DevOps and CIS Security Controls Fit Together

The Center for Internet Security’s Critical Security Controls has become an industry standard set of controls for securing the enterprise. Now on version 8, the original 20 controls are down to 18 with several sub controls added.The first six basic controls can prevent 85 percent of the most common cyber attacks, and even though the controls have been develo
Publish At:2022-07-25 09:02 | Read:76858 | Comments:0 | Tags:DevOps CIS security Security Controls

Cybersecurity Policy – time to think outside the box?

When we get into cybersecurity, one of the first things any organisation or company should do is write a cybersecurity policy, one that is owned by all. Easy words to put down on paper, but what do they mean?So, what is a cybersecurity policy? Well, it is defined in the Gartner IT Glossary as, “an organization’s statement of intent, principles and appro
Publish At:2022-07-21 01:06 | Read:76810 | Comments:0 | Tags:Featured Articles Security Controls cybersecurity policy pol

What Is GitOps and How Will it Impact Digital Forensics?

GitOps is arguably the hottest trend in software development today. It is a new work model that is widely adopted due to its simplicity and the strong benefits it provides for development pipelines in terms of resilience, predictability, and auditability. Another important aspect of GitOps is that it makes security easier, especially in complex cloud and con
Publish At:2022-07-14 01:06 | Read:197328 | Comments:0 | Tags:Security Controls development DevOps DFIR Digital Forensics

Center for Internet Security (CIS) Controls v8: Your Complete Guide to the Top 18

The Center for Internet Security (CIS) controls are a relatively short list of high-priority, highly effective defensive actions that provide a “must-do, do-first” starting point for every enterprise seeking to improve its cyber defense.Initially developed by the SANS Institute and known as the SANS Critical Controls, these best practices are indispensable t
Publish At:2022-07-05 09:02 | Read:171373 | Comments:0 | Tags:Security Controls CIS cis controls cyber defence cyber defen

What Is ISO/IEC 27017?

More than a third of organizations suffered a serious cloud security incident in 2021. According to a survey of 300 cloud professionals covered by BetaNews, 36% of those respondents said that their organizations had suffered a severe cloud security data leak or breach in the past 12 months. Looking forward, eight in 10 survey participants said they were worr
Publish At:2022-06-09 02:13 | Read:60334 | Comments:0 | Tags:Cloud Featured Articles Security Controls cloud services com

CIS Control 18 Penetration Testing

Penetration testing is something that more companies and organizations should be considering a necessary expense. I say this because over the years the cost of data breaches and other forms of malicious intrusions and disruptions are getting costlier. Per IBM Security’s “Cost of a Data Breach Report 2021,” the average cost of a breach has increased 10% year
Publish At:2022-05-12 02:13 | Read:46549 | Comments:0 | Tags:Featured Articles Security Controls cis controls penetration

CIS Control 17: Incident Response Management

We all know that it is a question of when you will be compromised and not if you will be compromised. It is unavoidable. The goal of CIS Control 17 is to ensure that you are set up for success when that inevitable breach occurs. If an organization is neither equipped nor prepared for that potential data breach, they are not likely to succeeded in responding
Publish At:2022-04-27 11:15 | Read:96265 | Comments:0 | Tags:Security Controls cis controls Incident Management incident

The Cyber Assessment Framework: Guided Cyber Resilience

Remember how, just a few years ago, many organizations were striving to be cyber secure? Over the last years, it seemed that crowing about one’s cybersecurity posture became the very thing that mocked every organization that was the victim of a newsworthy compromise. Many organizations began augmenting their previously acclaimed security posture towards
Publish At:2022-04-27 02:08 | Read:123760 | Comments:0 | Tags:Featured Articles Security Controls Cyber Assessment Framewo

CIS Control 16 Application Software Security

The way in which we interact with applications has changed dramatically over years. Enterprises use applications in day-to-day operations to manage their most sensitive data and control access to system resources. Instead of traversing a labyrinth of networks and systems, attackers today see an opening to turn an organizations applications against it to bypa
Publish At:2022-04-21 02:08 | Read:89552 | Comments:0 | Tags:Featured Articles Security Controls security

Your Guide to the NIST Cybersecurity Framework

span class="entry-content post-content">To put the impact of cybercrime into perspective, let’s examine some important, and startling, numbers:Data breach costs increased from $3.86 million to $4.24 million in 2021.Every 39 seconds, there is an attack.About 90% of healthcare organizations have fallen victim to at least one breach within the past three years.
Publish At:2022-04-03 17:51 | Read:184952 | Comments:0 | Tags:Security Controls NIST NIST Cybersecurity Framework NIST fra


span class="entry-content post-content">Como profesionales de la ciberseguridad, siempre insistimos en la importancia de la gestión de parches como una de las mejores formas de proteger los sistemas contra las vulnerabilidades. A veces, las vulnerabilidades nunca se explotan del todo. Independientemente de la posibilidad de la amenaza, la aplicación de parch
Publish At:2022-04-01 02:07 | Read:34897 | Comments:0 | Tags:Security Controls Spanish configuration Configuration Manage


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud