HackDig : Dig high-quality web security articles for hacker

IBM Named a Leader in Latest IDC Worldwide MarketScape

Many CISOs tell us one of their most difficult challenges is identifying, hiring and retaining top security talent with the skills, experience and passion to protect their organizations’ valuable brand against the dynamic cyberthreat landscape. It’s for this reason CISOs often turn to managed security services providers as a strategy to partner a
Publish At:2017-09-21 00:50 | Read:122 | Comments:0 | Tags:Security Services IBM Managed Security Services (MSS) IDC Ma

Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold

Since we last reported on a version of the ELF Linux/Mirai malware containing cryptocurrency coin-mining tools in April, the IBM X-Force has noticed a steep increase in the volume of coin central processing unit (CPU) mining tools used in cyberattacks, specifically those targeting enterprise networks. According to IBM Managed Security Services (MSS) data,
Publish At:2017-09-19 12:00 | Read:66 | Comments:0 | Tags:Advanced Threats Security Services Threat Intelligence X-For

Seven Steps to Improve Your Security Operations and Response

It’s hard to escape the reality that every day, cyberthreats morph and expand, escalating the need to improve and tighten security operations and response practices. While it may feel overwhelming, there are ways to help level the playing field. Cognitive computing and machine learning are new technologies that can empower security practitioners to foc
Publish At:2017-09-05 09:35 | Read:148 | Comments:0 | Tags:CISO Cognitive Endpoint Incident Response Security Intellige

Incident Response and Threat Intelligence: A Potent One-Two Punch to Fight Cybercrime

Cybercriminals and their tactics are becoming increasingly sophisticated. Given the rash of widespread, devastating attacks thus far in 2017, this trend shows no signs of slowing down. It’s no longer enough to simply implement incident response solutions. Today’s threats require a dedicated team of security experts to maximize these tools with
Publish At:2017-08-17 19:00 | Read:170 | Comments:0 | Tags:Incident Response Security Services Threat Intelligence Adva

IDaaS Vendors: IBM Cloud Identity Service Named Market Leader in Six Recent Analyst Reports

Not one, not two, but six of the most recent analyst reports evaluating the major Identity and Access Management-as-a-Service (IDaaS) vendors positioned IBM Cloud Identity Service as an overall market leader in cloud-based identity and access management (IAM). The market is crowded with both startups and large IDaaS vendors, making this is a big win for IBM
Publish At:2017-08-16 09:00 | Read:153 | Comments:0 | Tags:Cloud Security Identity & Access Security Services Cloud Ide

Threat Hunting Services Are Now a Basic Necessity

For the past few years, the security industry has seen a gradual move away from traditional, resource-heavy endpoint protection agents to next-generation solutions in response to the increasing sophistication of malware, cybercriminal tactics and the threat landscape at large. Traditional host intrusion detection systems (HIDS) built on signature-based det
Publish At:2017-08-07 21:55 | Read:253 | Comments:0 | Tags:Endpoint Security Intelligence & Analytics Security Services

Hello, My Name Is Space Rogue

IBM X-Force Red marked its first-year anniversary with the addition of security specialists, including Space Rogue, who increases the team’s impressive roster of talent. Hello, my name is Space Rogue. Well, actually, it’s Cris Thomas, but the security community is most likely to recognize my work over the past two decades under my pseudonym. The
Publish At:2017-07-28 03:30 | Read:316 | Comments:0 | Tags:Application Security Security Services X-Force Research IBM

How Virus Protection Software Has Evolved With the Threat Landscape

John McAfee turned some heads in the security community two years ago when he declared that the virus protection software industry, which he is widely credited with creating 30 years ago, is dead. “In 1987, new applications for the Windows platform were being developed and released at a rate of about one new application per month,” he wrote. &#
Publish At:2017-07-17 19:15 | Read:347 | Comments:0 | Tags:Endpoint Fraud Protection Antivirus Malware Security Service

Know the Odds: The Cost of a Data Breach in 2017

We’ve all heard that when it comes to experiencing a data breach, the question is not if it will happen, but when. You may be wondering about the actual odds of it happening to your organization. Think about it this way: The chances of being struck by lightning this year are 1 in 960,000. When it comes to experiencing a data breach, according to the Po
Publish At:2017-06-20 22:45 | Read:625 | Comments:0 | Tags:Data Protection Incident Response Security Services Cost of

The Competing Claims of Security Vendors Sow Customer Distrust

Exploits, data breaches and ransomware campaigns are succeeding despite increased public awareness about these threats. New victims are found, old targets are rediscovered and people want to know how this keeps happening. It isn’t because people don’t care. In the past three years, according to Google Trends, the subject of hacking has generated
Publish At:2017-05-05 20:20 | Read:341 | Comments:0 | Tags:CISO Risk Management Security Intelligence & Analytics secur

Five Questions to Ask Yourself About the Security of Your Cloud Workloads

By 2020, 90 percent of enterprises will be on the hybrid cloud. Even though a move to the cloud is now inevitable, few organizations have a comprehensive grasp of how to secure it. This is especially challenging when organizations are on multiple cloud environments from multiple service providers, since each has its own set of native security controls. Five
Publish At:2017-04-27 01:10 | Read:855 | Comments:0 | Tags:Cloud Security Security Services Cloud Cloud Services Provid

A Dream of Cognitive Security? How Watson Can Help Small and Midsized Businesses Save Money

The is the second article in a three-part series on how IBM Watson for Cyber Security can help analysts win the arms race against the increasingly sophisticated cybercrime landscape. Be sure to read part 1 for the full story. Many large enterprises with significant investment in cybersecurity are excited at the prospect of cognitive security. But what abou
Publish At:2017-04-25 12:21 | Read:554 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Security Service

And Don’t Be Falling in Love as Security Services Experts Are Walking Away

When it comes to taking chances and not letting an opportunity pass you by, Zac Brown Band said it best in the song, “As She’s Walking Away”: And don’t be falling in love as she’s walking away When your heart won’t tell your mind to tell your mouth what it should say May have lost this battle, live to fight another day Don
Publish At:2017-03-14 11:25 | Read:553 | Comments:0 | Tags:Risk Management IBM IBM InterConnect IBM Managed Security Se

Link Arms Against the Attackers: Observations from the 2016 Cisco ASR

Remember 2007, when the underground economy began to flourish, using simple protocols and static subnet ranges to control their infrastructure? That was the same year Cisco published the first Annual Security Report (ASR). Nine years later, the drumbeat of cyberthreats grow louder, but the actors and threats are familiar, just as John reminded us when this y
Publish At:2016-01-27 03:30 | Read:1204 | Comments:0 | Tags:Security 2016 ASR Active Threat Analytics cisco-ata incident

The 4×4 Security and Organization: Program Metrics

Mapping Business Drivers to Program Metrics You wouldn’t measure the value of a house by the cubic footage of volume — you could, but it wouldn’t tell you much about what we value in a house. Similarly, you can’t measure the success of a security program with typical IT metrics like service level agreements (SLAs) and number of transactions
Publish At:2015-11-18 03:30 | Read:895 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) Security Inte

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud