HackDig : Dig high-quality web security articles for hacker

Back to Filing Cabinets? Simplifying the Complex Task of Data Security

Data drives our businesses, economy and daily lives, so it comes as no surprise that data security needs to be a priority. But do we know what data we really have, where sensitive information is being collected and stored, what is happening with the data and where it is ultimately going? How do we build security around critical assets that we need to protect
Publish At:2017-09-29 11:50 | Read:642 | Comments:0 | Tags:Data Protection Data Classification Data Privacy Data Securi

From the Starship Enterprise to Your Enterprise: Eight Cybersecurity Lessons From ‘Star Trek’

Many people in the security industry today grew up watching “Star Trek,” from the original episodes to Next Generation, Deep Space Nine, Voyager, Enterprise and the many other series that followed. In anticipation of the upcoming “Star Trek: Discovery” series, we thought it would be a good time to remind our readers that, beyond the e
Publish At:2017-09-25 15:30 | Read:584 | Comments:0 | Tags:CISO Risk Management Cyber Risk Cybersecurity Incident Respo

Blindfolded on the Battlefield: The Importance of Threat Hunting in the Modern Age

One of the fundamental problems with cybersecurity is that organizations often do not realize when they are compromised. Traditional incident response methods are typically reactive, forcing security teams to wait for a visible sign of an attack. The problem is that many attacks today are stealthy, targeted and data-focused. Just stop for a moment to ask you
Publish At:2017-08-23 22:25 | Read:475 | Comments:0 | Tags:Data Protection Risk Management Data Breach Threat Detection

Security Monitoring and Analytics: Moving Beyond the SIEM

This is the final installment in a three-part series. Be sure to read Part 1 and Part 2 for more information. Improving integration, visibility and analytics with a platform approach to security information and event management (SIEM) is the means to the business value of security, compliance and operational efficiency. Security teams are operating in an
Publish At:2017-08-21 15:05 | Read:479 | Comments:0 | Tags:Security Intelligence & Analytics Security Analytics Securit

Assessing Risks and Remediating Threats With a Layered Approach to Vulnerability Management

Companies need to do more than just scan for known problems and provide huge vulnerability reports to system and network administrators for remediation. According to Gartner, known vulnerabilities still comprise 99 percent of all known exploit traffic. Furthermore, malware, ransomware and exploit kits target vulnerabilities that are six months or older on av
Publish At:2017-08-09 07:50 | Read:566 | Comments:0 | Tags:CISO Risk Management Security Intelligence & Analytics Patch

Threat Hunting Services Are Now a Basic Necessity

For the past few years, the security industry has seen a gradual move away from traditional, resource-heavy endpoint protection agents to next-generation solutions in response to the increasing sophistication of malware, cybercriminal tactics and the threat landscape at large. Traditional host intrusion detection systems (HIDS) built on signature-based det
Publish At:2017-08-07 21:55 | Read:608 | Comments:0 | Tags:Endpoint Security Intelligence & Analytics Security Services

How Virus Protection Software Has Evolved With the Threat Landscape

John McAfee turned some heads in the security community two years ago when he declared that the virus protection software industry, which he is widely credited with creating 30 years ago, is dead. “In 1987, new applications for the Windows platform were being developed and released at a rate of about one new application per month,” he wrote. &#
Publish At:2017-07-17 19:15 | Read:700 | Comments:0 | Tags:Endpoint Fraud Protection Antivirus Malware Security Service

New Threats? No Problem! Identify Emerging Cybercrime Trends Early to Fight Financial Fraud

Every year, cyberattacks become more sophisticated, new malware emerges and fraud losses rise. Have you ever looked at your banking information to see a transaction that you didn’t make? Have you ever checked your credit report to find cards you never signed up for or high balances you didn’t create? Unfortunately, financial fraud is an issue ma
Publish At:2017-06-27 02:05 | Read:587 | Comments:0 | Tags:Fraud Protection Risk Management Bank Fraud Banking Security

Four New Cyberthreats on the CISO’s Radar

Enterprises today face new cyberthreats from many different vectors, including some that didn’t exist just a few years ago. Chief information security officers (CISOs) need to keep their eyes on the evolving ways their companies can be breached and close any gaps to minimize the damage. Four New Cyberthreats Facing CISOs 1. Ransomware The latest high
Publish At:2017-05-30 22:30 | Read:771 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) Cyberthreats

Hey Phishing, You Old Foe — Catch This Cognitive Drift?

Phishing is one of the internet’s oldest online threats. Its history traces back to the mid-1990s, but it unfortunately continues to escalate in numbers. Based on social engineering, phishing can be delivered to an email address or through an SMS message with a URL inside. It can even come from inside a document saved locally on the recipient’s e
Publish At:2017-03-27 13:00 | Read:1323 | Comments:0 | Tags:Banking & Financial Services Cognitive Fraud Protection Frau

Understanding Cyber Threat Hunting

Authored by Bob Stasio, Senior Product Manager, i2 Enterprise Insight Analysis (EIA), IBM Industry Solutions. When experts discuss the breakdown of cyberthreats, the 80/20 principle is often brought up. This principle is based on the idea that 80 percent of cyberthreat actors are generally unsophisticated, while the other 20 percent are so advanced that, giv
Publish At:2017-03-23 16:56 | Read:648 | Comments:0 | Tags:Risk Management Security Intelligence & Analytics Advanced T

Enterprise Intelligence Brief: Threat Hunting Takes Center Stage

Can organizations proactively hunt for and deter cyberthreats? Is threat hunting and hunt analysis feasible? Cybersecurity leaders tackled these questions in this issue of our Enterprise Intelligence Brief. 2017: The Year of Threat Hunting Analysis Cyberthreat intelligence expert Bob Stasio predicted that 2017 will be the year of threat hunting analysis. Thi
Publish At:2017-02-02 02:30 | Read:1313 | Comments:0 | Tags:Data Protection Risk Management Advanced Threat Protection S

With AI2, Machine Learning and Analysts Come Together to Impress, Part 3: The Experiment

This is the third and final installment in a series covering AI2 and machine learning. Be sure to read Part 1 for an introduction to AI2 and Part 2 for background on the algorithms used in the system. Machine Learning, Human Teaching The data set researchers Kalyan Veeramachaneni and Ignacio Arnaldo used to produce their paper, “AI2: Training a Big Dat
Publish At:2016-12-19 22:55 | Read:1133 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

With AI2, Machine Learning and Analysts Come Together to Impress, Part 2: The Algorithms

This is the second installment in a three-part series covering AI2 and machine learning. Be sure to read Part 1 for an introduction to AI2. AI2 is an “analyst-in-the-loop” system, meaning that it exploits the expertise of a security analyst to improve itself. A “human-in-the-loop” system is used to generate more supervised examples fo
Publish At:2016-12-13 18:40 | Read:1609 | Comments:0 | Tags:Cognitive X-Force Research Cognitive Computing Cognitive Sec

With AI2, Machine Learning and Analysts Come Together to Impress, Part 1: An Introduction

Machine learning is everywhere in the world of cybersecurity these days. It is often thought of as the magic bullet to secure systems and networks — a tool able to identify previously invisible attacks through a nontransparent set of functions, as in neural nets. Transparency aside, neural nets and other algorithms have indeed proven very effective. Security
Publish At:2016-12-06 01:50 | Read:798 | Comments:0 | Tags:Cognitive X-Force Research Cognitive Computing Cognitive Sec


Share high-quality web security related articles with you:)


Tag Cloud