HackDig : Dig high-quality web security articles for hacker

Climbing the Vulnerability Management Mountain: Reaching Maturity Level 1

The time at ML:0 can be eye-opening form many organizations. There are generally a lot of assets discovered that are new or had been forgotten about. Almost every organization discovers their own Methuselah; this is the system that has been around forever and performs some important tasks but has not been updated in years. The system admins are scared to tou
Publish At:2019-10-18 10:10 | Read:262 | Comments:0 | Tags:Vulnerability Management ML1 VM Vulnerability

Moving to a Virtualized Environment? The Key Things You Need to Know about Your Security

Since cloud technology first appeared on the scene, companies have been battling with the concept of cloud security. The reality is that the cloud presents you with three unique challenges from a security perspective.1. You need to think differentlyIt may sound obvious, but the cloud is different from a physical data centre. When IT departments were focused
Publish At:2017-01-27 16:50 | Read:3884 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Cloud malw

Understand and Managing Change: Why We Shouldn’t Rely on the Human Element

At some point in our lives, we have all experienced a time when we had something break, quit working, or at the very least not work the way we expected. After exhausting our personal skills in trying to figure out how to fix the problem, we end up calling the repairman – the expert that will help us get back on track.In the IT Ops and IT Security worlds, the
Publish At:2016-11-12 22:57 | Read:2944 | Comments:0 | Tags:Featured Articles Security Configuration Management Change I

Does malware still detect virtual machines?

In the security field, virtual machines (VM) have been used for many years and are popular among researchers because malware can be executed and analyzed on them without having to reinstall production systems every time. As we previously discussed, these tests can be done manually or on automated systems, with each method providing different bene
Publish At:2014-08-15 01:11 | Read:2451 | Comments:0 | Tags:Security Security Response Endpoint Protection (AntiVirus) M

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud