HackDig : Dig high-quality web security articles

Attracting Cybersecurity Talent Takes an Open Mind, Creativity and Honesty

Retaining cybersecurity talent can be difficult. Along with our previous tips, how can you attract great workers?   Difficulties and Positive Changes   The recent ISACA State of Cybersecurity 2022 survey provides some key markers: Unfilled positions are on the rise (not good) Existing teams are understaffed (not good) Budgets are (finall
Publish At:2022-06-23 13:08 | Read:65 | Comments:0 | Tags:CISO Risk Management Security Services ai security zero trus

Cloud Native Application Protection Platform: A Utility Knife for Cloud Security Services

Does the world need another acronym? Probably not. But it seems like one is born every day in the cybersecurity market. As a tradeoff for the brain power to recall their cryptic meanings, we should at least expect progress on the technology front. We have seen this before. With all that’s happened in the last decade, point products for network securit
Publish At:2022-06-15 14:17 | Read:751 | Comments:0 | Tags:Application Security Cloud Security Security Services cloud

How to Make Business Practices That Support Cybersecurity Response

Scottish author Robert Burns wrote in the poem “To a Mouse,” “The best-laid schemes o’ mice an’ men. Gang aft a-gley.” You may better know the saying in its more common form, “The best-laid plans of mice and men often go awry.”   This saying may resonate with incident responders, business continuity plann
Publish At:2022-06-13 10:18 | Read:326 | Comments:0 | Tags:Security Services business practices Cybersecurity Incident

One Size Does Not Fit All Organizations

Often, when you read about cybersecurity, the advice appears to be ‘one size fits all’. People recommend the same things, regardless of if the business is two people in a home office or a global group with 100,000 employees. In some ways, the underlying concepts of cybersecurity are the same for all companies. However, the way that you put the s
Publish At:2022-06-09 10:18 | Read:193 | Comments:0 | Tags:Risk Management Security Services zero trust Zero Trust Arch

IBM to Acquire Randori, Transforming How Clients Manage Risk with Attack Surface Management

Organizations today are faced with defending a complex technology landscape — with cyberattacks targeted at constantly changing cloud, distributed, and on-premises environments. Often escaping security scans and periodic assessments, these changes represent windows of opportunities for attackers looking to bypass defenses. While there always have &md
Publish At:2022-06-06 14:16 | Read:235 | Comments:0 | Tags:Intelligence & Analytics Incident Response Risk Management S

Real Security Concerns Are Scarier Than Doomsday Predictions

The metaverse, artificial intelligence (AI) run amok, the singularity … many far-out situations have become a dinner-table conversation. Will AI take over the world? Will you one day have a computer chip in your brain? These science fiction ideas may never come to fruition, but some do point to existing security risks. While nobody can predict the fu
Publish At:2022-06-06 10:18 | Read:312 | Comments:0 | Tags:Software Vulnerabilities Malware Risk Management Security Se

Recovering Ransom Payments: Is This the End of Ransomware?

What’s the best way to stop ransomware? Make it riskier and less lucrative for cyber criminals. Nearly all intruders prefer to collect a ransom in cryptocurrency. But it’s a double-edged sword since even crypto leaves a money trail. Recovering ransomware payouts could lead to a sharp decline in exploits. Ransomware is still today’s top att
Publish At:2022-06-02 10:19 | Read:255 | Comments:0 | Tags:Advanced Threats Risk Management Security Services Cryptocur

To Retain Cybersecurity Employees, Know What Drives Them

COVID-19 may have given cybersecurity talent retention an artificial prop up over the last two years. For example, job satisfaction was on a downward trend from 2018 to 2019, but with the pandemic came a plateau in 2020 and 2021. Was the plateau due to newfound satisfaction or were there other factors, such as economic instability, lockdowns and mandates? I
Publish At:2022-05-31 10:18 | Read:301 | Comments:0 | Tags:CISO Risk Management Security Services COVID-19 cyber securi

Lessons Learned by 2022 Cyberattacks: X-Force Threat Intelligence Report

Every year, the IBM Security X-Force team of cybersecurity experts mines billions of data points to reveal today’s most urgent security statistics and trends. This year’s X-Force Threat Intelligence Index 2022 digs into attack types, infection vectors, top threat actors, malware trends and industry-specific insights.  This year, a new indus
Publish At:2022-05-26 10:29 | Read:408 | Comments:0 | Tags:Application Security Data Protection Energy & Utility Incide

Cybersecurity Tips for a Safer Vacation

The beauty of having different climates around the world is that there is always somewhere we can travel for leisure all year round. These are times when we tend to relax and let our guard down. The reality, though, is that cyber crime knows no vacation. Attackers are relentless and are always on the lookout for the easiest path to their next prey. That mak
Publish At:2022-05-24 10:18 | Read:271 | Comments:0 | Tags:Identity & Access Incident Response Risk Management Security

How to Respond to Non-Malicious Data Breaches

It’s easy to assume most, if not all, data breaches are malicious. Surely, attackers strike on purpose. However, almost two-thirds of data breaches start from mistakes, not an intent to cause harm. According to the Cost of Insider Threats Report from Ponemon, negligent employees create around 62% of security incidents, costing an average of $307,111 p
Publish At:2022-05-23 10:18 | Read:349 | Comments:0 | Tags:Data Protection Incident Response Risk Management Security S

Malicious Reconnaissance: What It Is and How To Stop It

You spend your days getting ready to stop threat actors. But even as you wonder, attackers could already be ‘casing the joint’.  Before any well-organized attack, skillful or professional attackers quietly snoop around, looking for chances to gain access. It’s called malicious reconnaissance — the unauthorized active monitoring
Publish At:2022-05-19 10:18 | Read:359 | Comments:0 | Tags:Risk Management Security Services threat actors 5G security

ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups

IBM Security X-Force researchers have continually analyzed the use of several crypters developed by the cybercriminal group ITG23, also known as Wizard Spider, DEV-0193, or simply the “Trickbot Group”. The results of this research, along with evidence gained from the disclosure of internal ITG23 chat logs (“Contileaks”), provide new
Publish At:2022-05-19 06:20 | Read:390 | Comments:0 | Tags:Malware Security Services Threat Intelligence Threat Researc

How Dangerous Is the Cyber Attack Risk to Transportation?

If an attacker breaches a transit agency’s systems, the impact could reach far beyond server downtime or leaked emails. Imagine an attack against a transportation authority that manages train and subway routes. The results could be terrible.  Between June of 2020 and June of 2021, the transportation industry witnessed a 186% increase in weekly ra
Publish At:2022-05-17 10:18 | Read:657 | Comments:0 | Tags:Mainframe Risk Management Security Services Threat Hunting c

Avoiding the Unintended Consequences of Strict Cybersecurity Policies

Does the left hand know what the right hand is doing? Or does even the left pinky know what the left ring finger is doing? Problems can easily arise when policies, including cybersecurity ones, end up being out of sync with business, technical, legal or regulatory requirements. The situation becomes even more severe when policy drafters end up with some str
Publish At:2022-05-16 10:18 | Read:525 | Comments:0 | Tags:CISO Data Protection Risk Management Security Services Cloud


Share high-quality web security related articles with you:)
Tell me why you support me <3