HackDig : Dig high-quality web security articles for hackers

Shift Your Cybersecurity Mindset to Maintain Cyber Resilience

As the business world navigates the ups and downs of today’s economy, a mindset shift is required to maintain cyber resilience. Cybersecurity, often an afterthought in a strong economy, must not be neglected in responding to shifts in the business landscape. As more companies expand their remote workforce, the number of endpoints with access to corpora
Publish At:2020-06-04 12:22 | Read:630 | Comments:0 | Tags:Data Protection Identity & Access Business Continuity C-Suit

What Enterprises Can Expect Following the Cyberspace Solarium Commission Report

In March 2020, the U.S. Cyberspace Solarium Commission released its report detailing numerous recommendations for how the nation can strengthen its online infrastructure and overall security posture. The Cyberspace Solarium Commission tackled issues of security strategy and overall cybersecurity preparedness across both the private and public sectors in the
Publish At:2020-06-01 11:00 | Read:704 | Comments:0 | Tags:CISO Government Business Continuity Chief Information Securi

Measuring the Effectiveness of AI in the SOC

In a previous blog post, I covered some of the challenges encountered by security operations centers (SOCs) and how leveraging artificial intelligence (AI) can help alleviate these challenges, including the cybersecurity skills shortage, unaddressed security risks and long dwell times. According to ISACA’s State of Cybersecurity Report, 78 percent of r
Publish At:2020-05-24 06:18 | Read:659 | Comments:0 | Tags:Artificial Intelligence Artificial Intelligence (AI) Busines

Defragging Security With a Platform Approach

Cybersecurity leaders and security teams are going through a tough phase. On one hand, cyberattacks are at an all-time high with 8.5 billion records breached in 2019 and ransomware attacks up 67 percent year-over-year in Q4 2019, according to the X-Force Threat Intelligence Index. On the other hand, security leaders are faced with the problem of security com
Publish At:2020-04-17 13:00 | Read:940 | Comments:0 | Tags:CISO Cloud Cloud Services Compliance Cyberattacks Data Prote

3 Things to Do Today to Help Combat the Gender Gap in Cybersecurity

The cybersecurity industry has a problem: In 2019, women made up only 20 percent of the cybersecurity workforce. This statistic would be alarming in any industry given the amount of research that espouses the benefits of more balanced, diverse workforces. But it is especially troublesome in cybersecurity, where we already face a serious skills shortage. So,
Publish At:2020-03-10 10:01 | Read:1133 | Comments:0 | Tags:CISO Career Cybersecurity Jobs Security Leaders Security Lea

What Leadership Qualities for CISOs Are Most Important in 2020?

Organizations today have to balance the need for continuous evolution along the digital continuum with the need to protect their data and operations and keep cyber risk at an acceptable level. The chief information security officer (CISO) role is uniquely positioned to help organizations manage those dualities, but it requires a different set of leadership q
Publish At:2020-02-09 10:30 | Read:882 | Comments:0 | Tags:CISO digital trust Business Continuity C-Suite Chief Informa

What Can We Learn From the ‘Global State of Information Security Survey 2018’?

In October 2018, PricewaterhouseCoopers (PwC) released the latest edition of “The Global State of Information Security Survey.” For this report, the professional services firm surveyed over 9,000 leaders, including CEOs, chief financial officers (CFOs), chief information officer (CIOs) and chief information security officers (CISOs), from 122 cou
Publish At:2017-11-02 13:10 | Read:5544 | Comments:0 | Tags:Risk Management Chief Information Officer (CIO) Chief Inform

Don’t Panic! Create a Winning Cybersecurity Strategy to Preserve CISO Sanity

Stress comes with the territory for chief information security officers (CISOs). As noted by Medium, the job is unpredictable, with “long periods of preparing, watching, waiting, punctuated by periods of high stress and occasional bruising.” As both vendors and cyberthreats proliferate, finding a balance between an effective cybersecurity strateg
Publish At:2017-10-31 05:50 | Read:4104 | Comments:0 | Tags:CISO Automation C-Suite Chief Information Security Officer (

Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

When things go wrong with computer systems and networks, whether due to ordinary mishaps or malicious actors, the organizations that rely on those systems and networks are put at risk. They may suffer direct financial losses, reputational damage or both, with effects ranging from inconvenience to total loss and liquidation of the enterprise. Understanding th
Publish At:2017-10-05 16:00 | Read:5408 | Comments:0 | Tags:Risk Management Executives Risk risk analysis Risk Assessmen

Fasten Your Seat Belt: Accelerating Your Digital Transformation Through Collaboration

When I think about my family vacations from childhood, I remember camping trips, hours on the beach, sharing stories around the campfire and the fun my siblings and I used to have in the back seat of the car — jumping on each other, switching seats and hopping from the third row into the front seat. Half the fun was enabled by the fact that we had no seat be
Publish At:2017-10-04 21:35 | Read:3943 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Cyber

Six Key Traits of an Effective Cyber Risk Advisor

What makes a good cyber risk advisor? What skills do they need to help board directors address cybersecurity? According to a report by BayDynamics, board directors “may not be experts in security, but they do know how to steer a business away from risk and toward profit by listening to subject matter experts. However, they expect those experts to frame
Publish At:2017-09-29 11:52 | Read:6060 | Comments:0 | Tags:Risk Management Chief Information Security Officer (CISO) Cy

How the Value Outweighs the Cost of Security

What is the cost of security in your company? Regardless of size, companies must prioritize the security of their business, customers, clients and partners. According to Forbes, Bank of America’s Chairman and CEO Brian Moynihan reported that the business spent $400 million on cybersecurity in 2015. He also noted that cybersecurity was the only sector w
Publish At:2017-09-26 09:56 | Read:3392 | Comments:0 | Tags:CISO Security Services Chief Information Security Officer (C

Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges

Every chief information security officer (CISO) faces ongoing threats to his or her company’s assets. While some threats apply to every industry, IT security specialists in the health care, financial services, and energy and utilities sectors need to pay more attention to industry-specific security risks. Although these threats are most prevalent in th
Publish At:2017-09-26 09:56 | Read:3770 | Comments:0 | Tags:Banking & Financial Services CISO Energy & Utility Health Ca

No Time for Techno-Babble: Four Key Traits of Quality CISO Reports

Board directors have very little patience for technical jargon. Given the tremendous pressure executives are under to avoid headline-grabbing data breaches, CISO reports should align enterprise risks with their potential impacts on business objectives in terms that nontechnical board members can easily understand. An EY report titled “The Evolving Role
Publish At:2017-09-18 17:25 | Read:6323 | Comments:0 | Tags:CISO Risk Management C-Suite Chief Information Security Offi

The New CISO: Management Through Thought Leadership

CISOs have a difficult path to success because their area of expertise is highly technical and one that few care to understand on a deep level. The success of today’s IT security leaders depends on their thought leadership and ability to present a continuous flow of understandable and interesting information that informs colleagues without jargon or fe
Publish At:2017-09-14 21:10 | Read:10274 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Execu

Tools