HackDig : Dig high-quality web security articles for hackers

How to Secure Microservices Architecture

The use of microservices-based architecture to realize complex, evolving solutions is growing in popularity. Microservices make it much easier to replace or upgrade components mid-flight. It also allows multiple developers to work on different aspects of the overall solution without affecting each other.  However, microservices architecture comes with
Publish At:2020-10-21 12:28 | Read:67 | Comments:0 | Tags:Network Security Services Microservices

Training Trainers: How IBM Uses Data Breach Simulations to Build Real-World Competency

Threat intelligence and response teams need to be ready to respond to an increasing barrage of risks and changes. To be exact, this is where breach-and-attack-simulation (BAS) comes in. Most groups use BAS platforms to validate security controls against various types of data breaches. Meanwhile, IBM Security saw that it could also be very useful as a t
Publish At:2020-10-21 08:34 | Read:67 | Comments:0 | Tags:Incident Response Security Services cyber resilience cyberse

Crisis and an Incontestable Need for Security — A Business Viewpoint

Data, data, data.  We have plenty of it, and in the eyes of some, it’s considered too much of a good thing. In practical terms, too much data often translates into blurred sight lines or the likely abetting of threats hiding within our environment. Improperly managed, it surely affects one’s ability to simply ‘see’ what’s
Publish At:2020-10-19 09:46 | Read:113 | Comments:0 | Tags:Cloud Security Data Protection Security Services Cybersecuri

IBM Named a CIAM Leader in the Forrester Wave Report

Not all leading identity and access management (IAM) vendors can also be successful as consumer identity and access management (CIAM) vendors. But with the right identity expertise, it’s possible. As Zero Trust mantras permeate the security and IT landscape, we know by now that everything’s about context, and not a single identity is to be trust
Publish At:2020-10-08 16:46 | Read:86 | Comments:0 | Tags:Identity & Access Risk Management Security Services Zero Tru

Web Application Security Best Practices: A Developer’s Guide

Digital adoption is only increasing in today’s world. It brings with it the challenges of safeguarding financial and personal data against potential threat actors. Including web application security best practices during application development can patch some of these holes and ensure the applications adhere to security standards and are free of vulne
Publish At:2020-10-05 10:46 | Read:166 | Comments:0 | Tags:Application Security Security Services Threat Hunting threat

Why a Security Maturity Model Can Transform How You Use Analytics

With cyberattacks and breaches on the rise, security should be a major concern for all companies. In particular, enabling the development of an analytics maturity model is a useful addition to your traditional security information and event management (SIEM)-based operations. It is possible to step away from only applying the traditional SIEM model with
Publish At:2020-10-01 08:15 | Read:132 | Comments:0 | Tags:Security Intelligence & Analytics Security Services Security

Taking the Risk Out of Mergers and Acquisitions

In the post-COVID-19 economy, cyber risk and cybersecurity will play a central role in unlocking mergers and acquisitions (M&A) deal valuations. While economic uncertainty has contributed to a decline in M&A activity in the first half of 2020, many analysts expect an increase in deals during 2020-21 based on several conditions. The Mergers and Acqui
Publish At:2020-09-30 12:45 | Read:161 | Comments:0 | Tags:Banking & Financial Services CISO Risk Management Security S

CORS: How to Use and Secure a CORS Policy with Origin

CORS (Cross-Origin Resource Sharing) enables resource sharing that pulls data from a lot of different sources. Like any relatively open aspect of the internet, it can be a risk. Learn how to test your web applications to create a secure CORS policy. Origins and Key Concepts CORS began as a way to make application resource sharing easier and more effective.
Publish At:2020-09-30 12:45 | Read:183 | Comments:0 | Tags:Application Security Security Services CORS Data

Cybersecurity Today: The Intersection of Technology and Behavior

In the movie “Back to the Future II,” protagonist Marty McFly travels forward to the year 2015. During a quick stop at Café 80s, Marty encounters two children, confused by the 80s-style arcade game in the store. When Marty shows them how to play, the kids retort with, “You mean you have to use your hands?” We may soon hav
Publish At:2020-09-30 12:45 | Read:225 | Comments:0 | Tags:Mobile Security Risk Management Security Services Cyber Risk

Risk Management: How Security Can Learn to Do the Math

Risk management is an important element in using data to get ahead of cybersecurity risks before they happen. The costs of protecting an enterprise of any size against cyber attacks continue to rise. Once a business truly understands the consequences of an incident, its leaders must decide how to manage the risk. They can choose to accept, reduce or av
Publish At:2020-09-16 21:17 | Read:194 | Comments:0 | Tags:CISO Risk Management Security Services Cybersecurity Financi

Back to Basics: Creating a Culture of Cybersecurity at Work

The importance of security culture can be seen now more than ever. Many of us work remotely; there are app concerns; and the lines between personal and business use of devices and networks are blurred, challenging our cyber resilience. Therefore, despite all the great tools, frameworks and protective measures in place, we need to ensure people are doin
Publish At:2020-09-16 09:33 | Read:294 | Comments:0 | Tags:CISO Data Protection Security Services cybersecurity educati

Creating a Cybersecurity Culture Starts With Your Team

As cyberattacks become more prevalent and sophisticated, companies must put more faith in their employees to make sure they don’t put data at risk or fall victim to ransomware. But, employees are busier than ever. And, creating a cybersecurity culture at work becomes both more important and more challenging when employees work at home. Creating a stro
Publish At:2020-09-09 13:18 | Read:232 | Comments:0 | Tags:CISO Data Protection Security Services Cybersecurity Trainin

Data Breach Protection Must Include Physical Security

If most of your business’ data and workloads are handled on public clouds, it can be easy to forget about the onsite servers. With office buildings empty, employees may assume the servers are protected by the same physical security as the rest of the facility. However, physical security has its own considerations, and paying careful attention to them
Publish At:2020-09-08 13:55 | Read:312 | Comments:0 | Tags:Network Security Intelligence & Analytics Security Services

Ransomware Attacks: How to Protect your Data With Encryption

Cybercriminals are making headlines using ransomware to block organizations from accessing their own critical business data to extort ransoms. Recently, the University of California San Francisco fell victim to a ransomware attack on key academic and research data (the institution is known to be working on a cure for COVID-19) and ended up paying over $1.14
Publish At:2020-09-04 12:08 | Read:302 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Malware Mob

SOC 2.0: A Guide to Building a Strong Security Ops Team

In a security operations center (SOC), your cybersecurity tools are only as good as the people using them and your SOC’s culture. What are the critical SOC roles? What qualities should you look for when hiring for them? And, what should you expect from a cybersecurity career? Learn more about why IBM was selected as a Global and European Leader in Man
Publish At:2020-09-02 17:10 | Read:343 | Comments:0 | Tags:Incident Response Security Intelligence & Analytics Security


Tag Cloud