HackDig : Dig high-quality web security articles for hacker

What the Explosive Growth in ICS-Infrastructure Targeting Means for Security Leaders

The recently published IBM X-Force Threat Intelligence Index 2020 pointed out that over 8.5 billion records were compromised in 2019, a figure that’s more than 200 percent greater than the number of records lost in 2018. It also determined that scanning and exploitation of vulnerabilities have increased from just 8 percent of attacks in 2018 to nearly
Publish At:2020-02-20 10:49 | Read:239 | Comments:0 | Tags:CISO Energy & Utility Security Services Brute-Force Attack C

Gaining Insight Into the Ponemon Institute’s 2020 Cost of Insider Threats Report

Today, I’m pleased to share some of the key findings from the 2020 Cost of Insider Threats Global Report. This is the third benchmark study, independently sponsored by IBM Security and ObserveIT to help understand the direct and indirect costs that result from insider threats. The first study was conducted in 2016 and focused exclusively on companies i
Publish At:2020-02-09 10:30 | Read:134 | Comments:0 | Tags:CISO Security Services Access Management Breach Credentials

5 Must-Haves for Your Next Managed Security Services Provider (MSSP)

Business environments are forcing organizations to rapidly evolve. Security and risk leaders are realizing that a modern security strategy requires dramatic changes to program governance, technology and execution. Yet many organizations managing their own security program can’t keep pace and lack the specialized skills and competencies needed to cost-e
Publish At:2019-10-18 10:20 | Read:830 | Comments:0 | Tags:CISO Security Services Managed Security Services (MSS) Manag

Accelerate the Value Gain With Identity Governance and Administration

I frequently receive calls from identity and access management (IAM) leads at companies that just purchased an identity governance and administration (IGA) tool. They say, “I just bought this tool so I can automate the access recertification process, but where do I start? The pressure to succeed with this project is already starting to get out of contr
Publish At:2017-11-01 18:45 | Read:2494 | Comments:0 | Tags:Identity & Access Security Services Governance Identity and

How the Value Outweighs the Cost of Security

What is the cost of security in your company? Regardless of size, companies must prioritize the security of their business, customers, clients and partners. According to Forbes, Bank of America’s Chairman and CEO Brian Moynihan reported that the business spent $400 million on cybersecurity in 2015. He also noted that cybersecurity was the only sector w
Publish At:2017-09-26 09:56 | Read:2487 | Comments:0 | Tags:CISO Security Services Chief Information Security Officer (C

IBM Named a Leader in Latest IDC Worldwide MarketScape

Many CISOs tell us one of their most difficult challenges is identifying, hiring and retaining top security talent with the skills, experience and passion to protect their organizations’ valuable brand against the dynamic cyberthreat landscape. It’s for this reason CISOs often turn to managed security services providers as a strategy to partner a
Publish At:2017-09-21 00:50 | Read:2815 | Comments:0 | Tags:Security Services IBM Managed Security Services (MSS) IDC Ma

Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold

Since we last reported on a version of the ELF Linux/Mirai malware containing cryptocurrency coin-mining tools in April, the IBM X-Force has noticed a steep increase in the volume of coin central processing unit (CPU) mining tools used in cyberattacks, specifically those targeting enterprise networks. According to IBM Managed Security Services (MSS) data,
Publish At:2017-09-19 12:00 | Read:4533 | Comments:0 | Tags:Advanced Threats Security Services Threat Intelligence X-For

Seven Steps to Improve Your Security Operations and Response

It’s hard to escape the reality that every day, cyberthreats morph and expand, escalating the need to improve and tighten security operations and response practices. While it may feel overwhelming, there are ways to help level the playing field. Cognitive computing and machine learning are new technologies that can empower security practitioners to foc
Publish At:2017-09-05 09:35 | Read:4052 | Comments:0 | Tags:CISO Cognitive Endpoint Incident Response Security Intellige

Incident Response and Threat Intelligence: A Potent One-Two Punch to Fight Cybercrime

Cybercriminals and their tactics are becoming increasingly sophisticated. Given the rash of widespread, devastating attacks thus far in 2017, this trend shows no signs of slowing down. It’s no longer enough to simply implement incident response solutions. Today’s threats require a dedicated team of security experts to maximize these tools with
Publish At:2017-08-17 19:00 | Read:2657 | Comments:0 | Tags:Incident Response Security Services Threat Intelligence Adva

IDaaS Vendors: IBM Cloud Identity Service Named Market Leader in Six Recent Analyst Reports

Not one, not two, but six of the most recent analyst reports evaluating the major Identity and Access Management-as-a-Service (IDaaS) vendors positioned IBM Cloud Identity Service as an overall market leader in cloud-based identity and access management (IAM). The market is crowded with both startups and large IDaaS vendors, making this is a big win for IBM
Publish At:2017-08-16 09:00 | Read:3187 | Comments:0 | Tags:Cloud Security Identity & Access Security Services Cloud Ide

Threat Hunting Services Are Now a Basic Necessity

For the past few years, the security industry has seen a gradual move away from traditional, resource-heavy endpoint protection agents to next-generation solutions in response to the increasing sophistication of malware, cybercriminal tactics and the threat landscape at large. Traditional host intrusion detection systems (HIDS) built on signature-based det
Publish At:2017-08-07 21:55 | Read:4016 | Comments:0 | Tags:Endpoint Security Intelligence & Analytics Security Services

Hello, My Name Is Space Rogue

IBM X-Force Red marked its first-year anniversary with the addition of security specialists, including Space Rogue, who increases the team’s impressive roster of talent. Hello, my name is Space Rogue. Well, actually, it’s Cris Thomas, but the security community is most likely to recognize my work over the past two decades under my pseudonym. The
Publish At:2017-07-28 03:30 | Read:7701 | Comments:0 | Tags:Application Security Security Services X-Force Research IBM

How Virus Protection Software Has Evolved With the Threat Landscape

John McAfee turned some heads in the security community two years ago when he declared that the virus protection software industry, which he is widely credited with creating 30 years ago, is dead. “In 1987, new applications for the Windows platform were being developed and released at a rate of about one new application per month,” he wrote. &#
Publish At:2017-07-17 19:15 | Read:4532 | Comments:0 | Tags:Endpoint Fraud Protection Antivirus Malware Security Service

Know the Odds: The Cost of a Data Breach in 2017

We’ve all heard that when it comes to experiencing a data breach, the question is not if it will happen, but when. You may be wondering about the actual odds of it happening to your organization. Think about it this way: The chances of being struck by lightning this year are 1 in 960,000. When it comes to experiencing a data breach, according to the Po
Publish At:2017-06-20 22:45 | Read:5381 | Comments:0 | Tags:Data Protection Incident Response Security Services Cost of

The Competing Claims of Security Vendors Sow Customer Distrust

Exploits, data breaches and ransomware campaigns are succeeding despite increased public awareness about these threats. New victims are found, old targets are rediscovered and people want to know how this keeps happening. It isn’t because people don’t care. In the past three years, according to Google Trends, the subject of hacking has generated
Publish At:2017-05-05 20:20 | Read:2838 | Comments:0 | Tags:CISO Risk Management Security Intelligence & Analytics secur

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud