HackDig : Dig high-quality web security articles for hackers

Measuring Security Operations Center Effectiveness Globally

Do you know what is it like to measure and optimize global security operations centers (SOCs)? At IBM Managed Security Services’ (MSS), we measure an SOC a bit like operating and managing the performance of a factory. It’s incredibly important to monitor and measure the performance of every component and how they all work together. This measurem
Publish At:2020-08-04 07:43 | Read:78 | Comments:0 | Tags:Security Intelligence & Analytics Security Services IBM Mana

All-in-one MSS is the Future — Are You Ready?

Managed security service providers (MSSPs) can speed up detection and response capabilities in complex, distributed security environments. However, many traditional managed security providers simply act as alert factories that collect log data and spit out low-value alerts. These increase the workload on their clients’ security teams rather than offloa
Publish At:2020-07-28 17:26 | Read:127 | Comments:0 | Tags:Security Services managed detection and response (MDR) Artif

Securing Travel and Transportation Operations

Transportation networks are foundational to our modern way of life. The current restrictions on global movement and the corresponding reduction in demand for travel and transportation services, while profound, are temporary. Forecasting future demand and capacity requirements is nearly impossible. But, the travel and transportation industries are part of the
Publish At:2020-07-22 10:51 | Read:126 | Comments:0 | Tags:Incident Response Network Security Services Advanced Threat

#TwitterHack: Power, Privilege and Pandemic

On Wednesday, July 15, the Twitterverse was ablaze with what Twitter itself has described as a “coordinated social engineering attack” that was launched at around 4pm ET. The outcome of this breach was compromised Twitter accounts of many well-known people and organizations, including Jeff Bezos, Elon Musk, Bill Gates, former President Barack Obama, Joe Bide
Publish At:2020-07-17 14:07 | Read:92 | Comments:0 | Tags:Advanced Threats Security Services Chief Information Securit

Securing Your Environment While Working Remotely

Before the coronavirus pandemic hit, working from home used to be a novelty for many employees. According to a June 2020 IBM Security and Morning Consult “Work From Home Survey,” 80% of respondents say they worked from home either rarely or not at all prior to the pandemic. In-office work allowed employers and information technology (IT) teams to
Publish At:2020-07-14 09:05 | Read:160 | Comments:0 | Tags:Incident Response Network Security Services Home Network Sec

How Zero Trust Will Change Your Security Design Approach

As a security architect within IBM Security Services, I often get asked the question, “What exactly is a Zero Trust architecture?” Well, there is no single or unique answer to that question for two reasons. First, Zero Trust is not an architectural model but rather a set of guiding principles that should be applied to existing and new designs. W
Publish At:2020-06-04 08:30 | Read:291 | Comments:0 | Tags:Security Services Zero Trust Access Management Enterprise Se

Managed Data Activity Monitoring (DAM) Is More Important Than Ever

The transition to a remote workforce has happened so quickly that many security teams have not had an opportunity to apply desired controls. Organizations are dealing with remote access and execution privileges that were unplanned even a couple of months ago. The use of personal devices and home workspaces has increased potential risks. Typical controls such
Publish At:2020-06-03 09:20 | Read:227 | Comments:0 | Tags:Data Protection Risk Management Security Services Compliance

Refocusing Cybersecurity Best Practices on Security Hygiene

While organizations around the world are rightly focused on the COVID-19 pandemic, the work of cybersecurity must continue. In fact, attackers often increase their efforts to breach networks and systems during times of trouble, counting on the chaos as a useful distraction. In such times, the best cybersecurity practices should actually refocus on the most b
Publish At:2020-05-24 06:18 | Read:292 | Comments:0 | Tags:CISO Antivirus Chief Information Security Officer (CISO) Cyb

Take a Bite Out of Sweyn

If you work in the healthcare industry, you may have heard about a family of vulnerabilities called “SweynTooth.” Researchers from Singapore first discovered the vulnerabilities in 2019. After waiting 90 days to announce them, which is part of the responsible disclosure process, they published a technical paper. If you are not familiar with the S
Publish At:2020-05-24 06:18 | Read:276 | Comments:0 | Tags:Application Security Healthcare Security Services Software &

Is a Managed Security Services Provider (MSSP) Right for Your Organization?

The constantly changing threat landscape makes a robust security program a moving target. But defenders aren’t standing still — from advanced artificial intelligence (AI) to real-time threat detection and adaptive risk protection, cybersecurity services are evolving to offer IT teams the breadth of knowledge and depth of functionality they need to rall
Publish At:2020-05-03 08:13 | Read:380 | Comments:0 | Tags:Security Services Artificial Intelligence (AI) Bring-Your-Ow

Ad Hoc or Managed Penetration Testing: Which One Is Best for You?

Penetration testing is no longer an extraordinary security engagement. Due to regulatory mandates, internal policies, business executive requests and the overall desire to avoid becoming the next breach victim, testing is now commonplace among many organizations. The kind of testing, however, can still be a question. Do you need ad hoc testing, that as-neede
Publish At:2020-05-03 08:13 | Read:368 | Comments:0 | Tags:Application Security Data Protection Risk Management Securit

Gain Visibility Into Operational Technology (OT) Environments With a Combined SOC

Operational technology (OT) encompasses many aspects of our world, including industrial control systems (ICS) that are used to control core operational processes. ICS technologies often control essential services such as water and power supply and are also used to monitor these services to prevent hazardous conditions. Manipulation of these systems and proce
Publish At:2020-05-03 08:13 | Read:395 | Comments:0 | Tags:Energy & Utility Security Intelligence & Analytics Security

COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface

As organizations adapt and respond to the impact of COVID-19, significant new challenges are on the rise as a majority of the workforce has shifted to remote work arrangements. Employee-owned devices and home networks that were not formerly protected by enterprise security controls have rapidly expanded many organizations’ attack surfaces. At the same
Publish At:2020-04-17 13:00 | Read:648 | Comments:0 | Tags:CISO Security Services Threat Hunting Threat Intelligence Co

Extend Your Security Team, Quickly Add Expertise and Help Secure Your Remote Workforce

Organizations around the world are adapting to respond to the impact of the novel coronavirus (COVID-19). Companies may experience increased stress and challenges across their security programs arising from increased remote user demand, site availability impacts, stringent travel restrictions and requests for social distancing. Security organizations may als
Publish At:2020-03-23 14:33 | Read:417 | Comments:0 | Tags:Endpoint Risk Management Security Services Endpoint Protecti

4 Principles That Should Define Your Evolving Security Operations Model

I recently had the opportunity to speak at a security conference where I presented the operating models that an organization can embrace when managing cyberthreats and the guiding principles associated with them. It was a great chance to share some of my experiences with the greater community and foster intellectual curiosity around an increasingly important
Publish At:2020-03-20 09:20 | Read:568 | Comments:0 | Tags:CISO Risk Management Security Services Cloud Security Cybert

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud