HackDig : Dig high-quality web security articles for hackers

Get back into the cybersecurity groove for 2021

byPaul DucklinA lot of technical articles, especially in the fields of computer science and information security, put you on the horns of a dilemma.To become an expert, you first need to read the article; yet to understand the article, you first need to be an expert.Well, here on Naked Security, we go out of our way to avoid this sort of “cybersecurity
Publish At:2020-12-31 09:49 | Read:187 | Comments:0 | Tags:Cryptography Privacy Security leadership Security threats se

S3 Ep8: A conversation with Katie Moussouris [Podcast]

byPaul DucklinHi, everyone – for S3 Ep8, we’ve gone live a day early to take into account the US Thanksgiving holiday on Thursday. (Followed, of course, by Black Friday, so if you’re splashing out online, please take care out there!)This week, we talk to hacker and vulnerability disclosure pioneer, Katie Moussouris. Katie Moussouris, CEO of
Publish At:2020-11-25 11:55 | Read:218 | Comments:0 | Tags:Podcast Security leadership Vulnerability @k8em0 bug bounty

How Cybersecurity Leaders Can Chart the Seas of Business Communication

As organizations prepare for the remainder of 2020, cybersecurity leaders can use this opportunity to review their communication style and improve how they share key messages across the organization. Taking time to refine business communication can help those in security and technical leadership roles heighten the effectiveness of their messaging and ensure
Publish At:2020-06-03 09:20 | Read:819 | Comments:0 | Tags:CISO Business Continuity C-Suite Chief Information Security

3 Things to Do Today to Help Combat the Gender Gap in Cybersecurity

The cybersecurity industry has a problem: In 2019, women made up only 20 percent of the cybersecurity workforce. This statistic would be alarming in any industry given the amount of research that espouses the benefits of more balanced, diverse workforces. But it is especially troublesome in cybersecurity, where we already face a serious skills shortage. So,
Publish At:2020-03-10 10:01 | Read:1268 | Comments:0 | Tags:CISO Career Cybersecurity Jobs Security Leaders Security Lea

Career and Management Advice to Improve Diversity From 21 Leading Women in Cybersecurity

Women in cybersecurity now represent 20 percent of the workforce, according to Cybersecurity Ventures. There’s still a long way to go in closing the industry gender gap, especially when you consider that women make up over half the U.S. workforce. However, the security industry has also made progress, and that’s something to be proud of. In 2013,
Publish At:2020-03-05 08:37 | Read:1111 | Comments:0 | Tags:CISO Career Collaboration Cyber Resiliency Cybersecurity Job

How to Avoid Cybersecurity Job Burnout and Go From Unsung Hero to Valued Contributor

Many in cybersecurity view the profession as a calling. Yet that same passion that brought you to your first cybersecurity job could also leave you feeling underappreciated and cause you to slide toward burnout. The flame of our passion can bring warmth, but without proper handling, it can also consume many of the things we care deeply about, including our o
Publish At:2020-02-28 11:15 | Read:783 | Comments:0 | Tags:CISO Cyber Resiliency Cybersecurity Jobs Incident Response (

A Road Map for Better Government Cybersecurity From North Dakota

Imagine the impact on the government cybersecurity landscape if the mantra for every U.S. state were something like, “Every student, every school, cyber-educated.” It’s the first I’ve heard about an objective this bold, and it comes from a state that gets little media exposure: North Dakota. The small Great Plains state has establishe
Publish At:2020-02-25 08:22 | Read:1958 | Comments:0 | Tags:Government Artificial Intelligence (AI) Cybersecurity Jobs C

What Leadership Qualities for CISOs Are Most Important in 2020?

Organizations today have to balance the need for continuous evolution along the digital continuum with the need to protect their data and operations and keep cyber risk at an acceptable level. The chief information security officer (CISO) role is uniquely positioned to help organizations manage those dualities, but it requires a different set of leadership q
Publish At:2020-02-09 10:30 | Read:1076 | Comments:0 | Tags:CISO digital trust Business Continuity C-Suite Chief Informa

How Cybersecurity Salaries Fit Experience and Specialization

Not too long ago, there was a one-size-fits-all assumption about cybersecurity jobs. The security professional was hired to manage security systems and read logs — maybe handle audits and ensure industry compliance. Now, the job landscape for cybersecurity professionals is becoming more specialized, and even those specialized areas break down into even more
Publish At:2019-10-18 10:20 | Read:1525 | Comments:0 | Tags:CISO Artificial Intelligence (AI) Career Chief Information S

Stay Calm, Your Incident Response Is Ready

Historically speaking, having a plan of attack has gotten a bad rap. Helmuth von Moltke the Elder, who famously said, “No plan survives contact with the enemy,” shared that sentiment with a predecessor in war, Napoleon Bonaparte, who said, “I never had a plan of operations.” Eisenhower warmed up to planning a bit: “In preparing
Publish At:2019-10-18 10:20 | Read:1661 | Comments:0 | Tags:Incident Response C-Suite Cost of a Data Breach Cyber Resili

What Can We Learn From the ‘Global State of Information Security Survey 2018’?

In October 2018, PricewaterhouseCoopers (PwC) released the latest edition of “The Global State of Information Security Survey.” For this report, the professional services firm surveyed over 9,000 leaders, including CEOs, chief financial officers (CFOs), chief information officer (CIOs) and chief information security officers (CISOs), from 122 cou
Publish At:2017-11-02 13:10 | Read:5689 | Comments:0 | Tags:Risk Management Chief Information Officer (CIO) Chief Inform

Security Awareness Training Is a Team Effort

A security awareness program is a critical part of any security strategy. It is not enough to simply hold everyone in the organization accountable. Chief information security officers (CISOs) must first train employees to practice proactive, conscientious security behaviors by convincing them that security affects them directly, not just the business. Buildi
Publish At:2017-10-31 05:50 | Read:4312 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) Cybersecurity

Employees Must Wash Hands: 11 Tips to Translate Awareness Into Better Security Hygiene

Are you security-aware? A lot more people today are answering yes than in previous years. Perhaps it’s because of their organizations’ own security awareness efforts, or maybe it’s due to the influx of news stories about ransomware, credit card hacks, data breaches and identity theft. If people are more aware of cybersecurity concerns, does
Publish At:2017-10-26 01:10 | Read:4876 | Comments:0 | Tags:CISO Risk Management Cybersecurity Training Education Nation

Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

When things go wrong with computer systems and networks, whether due to ordinary mishaps or malicious actors, the organizations that rely on those systems and networks are put at risk. They may suffer direct financial losses, reputational damage or both, with effects ranging from inconvenience to total loss and liquidation of the enterprise. Understanding th
Publish At:2017-10-05 16:00 | Read:5632 | Comments:0 | Tags:Risk Management Executives Risk risk analysis Risk Assessmen

Fasten Your Seat Belt: Accelerating Your Digital Transformation Through Collaboration

When I think about my family vacations from childhood, I remember camping trips, hours on the beach, sharing stories around the campfire and the fun my siblings and I used to have in the back seat of the car — jumping on each other, switching seats and hopping from the third row into the front seat. Half the fun was enabled by the fact that we had no seat be
Publish At:2017-10-04 21:35 | Read:4050 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Cyber

Tools

Tag Cloud