HackDig : Dig high-quality web security articles for hacker

Securing the Modern Endpoint the SANS Maturity Way

In Case You Missed It Bromium recently engaged in a series of communications and events on the topic of Securing the Modern Endpoint, covering timely and provocative concepts including: How detection consistently fails to secure the enterprise and why new thinking is desperately needed How to realign your defenses around a modern threat risk model using few
Publish At:2017-10-30 17:15 | Read:824 | Comments:0 | Tags:Threats case study data sheet defenses detection endpoint mo

SANS Maturity Model Webinar Describes How to Grow Your Security Strategy

Setting your security strategy is a challenging task that comes with lot of opinions (and vendors!). SANS provides a rationale for growing protection that is logically calibrated to growth and expanding needs. Register for this webinar and even if you can’t make it, we’ll send you the recording (and a whitepaper). With so many security solution
Publish At:2017-10-21 16:25 | Read:771 | Comments:0 | Tags:Innovation maturity model recording registration SANS Securi

Enterprise Security in the Age of Advanced Threats

The malware and IT security panorama has undergone a major change, and enterprise security will never be the same. Hackers have improved drastically, both in terms of volume and sophistication, new techniques are allowing threats to remain on corporate networks for much longer periods than ever before. Webinar  on the topic presented by Panda’s own Luis Cor
Publish At:2017-09-08 02:05 | Read:509 | Comments:0 | Tags:PandaLabs advanced cybersecurity business webinar

Detect and Prevent Data Exfiltration Webinar with Infoblox

Please join SANS Institute Instructor and LEO Cyber Security Co-Founder & CTO Andrew Hay and Infoblox Security Product Marketing’s Sam Kumarsamy on Thursday, August 17th, 2017 at 1:00 PM EDT (17:00:00 UTC) as they present a SANS Institute webinar entitled Detect & Prevent Data Exfiltration: A Unique Approach. Overview Data is the new currency i
Publish At:2017-08-16 18:15 | Read:572 | Comments:0 | Tags:News Webinar

Petya Webinar: Yet Another Ransomware Outbreak

Last week, yet another large-scale ransomware attack struck more than 60 countries. This attack, dubbed Petya/GoldenEye, not only encrypted data files on thousands of computers around the world, but also the MBR of their hard disks. After being attacked, victims were fully blocked from accessing their system the next time they rebooted it. It’s impossible to
Publish At:2017-07-03 16:15 | Read:533 | Comments:0 | Tags:Panda Security petya Ransomware webinar

Webinar: What’s Next for Targeted Attacks?

If there’s one thing that we’ve been repeating almost constantly this year, it’s that malware is evolving. And fast. But it might be more accurate to say that attacks themselves are evolving, and especially targeted attacks. As reported by Verizon in their 2017 Data Breach Investigations Report, malware was used in 51% of the cases in which there was a data
Publish At:2017-06-22 22:25 | Read:581 | Comments:0 | Tags:PandaLabs targeted attacks webinar

Mobile Security Perceptions vs. Reality

47% of cybersecurity professionals saw a year over year increase in mobile device threats We’ve teamed up with LinkedIn’s 350,000+ Information Security Community to bring you real answers on mobile security. Late last year, the Information Security Community launched its 2nd annual mobile security survey to find out what the community had to say about mobile
Publish At:2017-05-13 10:00 | Read:1074 | Comments:0 | Tags:Mobile security Threat Research Webinar

Security Week-in-Review: Old software, new problems

It’s hard to keep up with the hundreds of security-specific headlines published every week. So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore money-stealing malware, an SAP vulnerability from 2010, and patches. Check back every Friday to learn about the latest in securi
Publish At:2016-05-14 12:35 | Read:1448 | Comments:0 | Tags:Security breaches data breach security week in review softwa

Privacy vs. Security

If you think about it, practically every type of security product in the market provides security through surveillance. Surveillance is the act of keeping a close watch over someone or something in order to prevent or detect. In law enforcement it’s looking for crime but in an IT sense it’s monitoring for cyber activity. Either way, for the surveilled it tot
Publish At:2016-05-03 17:15 | Read:1246 | Comments:0 | Tags:Events Mobile security Webinar 451 Research privacy

Understanding the Value in Pesky PCI

Many merchants will tell you that PCI compliance is time-consuming and a drain on resources that should be focused on attracting more business – there is even a well-established market of PCI consultants and businesses to hire.The general sentiment is how to quickly and easily check the box. Monitoring and logging activity to create custom reports for the au
Publish At:2015-10-24 08:30 | Read:1028 | Comments:0 | Tags:Featured Articles PCI compliance David Bell Heartbleed Mario

Enhancing Mobility Management with Cyber Security

        Mobile devices and ubiquitous wireless connectivity have triggered a new lifestyle. We now access information anywhere, anytime as do our adversaries. You should proceed with caution! The power enabling us to do more, also makes us vulnerable to cyberattacks. We at Zimperium are playing our part in mobile safety and would like to
Publish At:2015-10-23 00:05 | Read:1337 | Comments:0 | Tags:Events Webinar Awareness Cybersecurity

Privileged Passwords: The Bane of Security Professionals Everywhere

Posted February 19, 2015   Dave ShacklefordPasswords have been with us since ancient times. Known as “watchwords”, ancient Roman military guards would pass a wooden tablet with a daily secret word engraved from one shift to the next, with each guard position marking the tablet to indicate it had been received. The military has been using passw
Publish At:2015-02-19 18:00 | Read:1378 | Comments:0 | Tags:Privileged Account Management dave shackleford enterprise pa

Cyber Due Diligence: Pre-Transaction Assessments Can Uncover Costly Risks

How can you discover if an investment target is one keystroke away from a major cyber incident or data breach? How can you determine that an attacker isn’t already lurking in their network? Cyber due diligence conducted prior to investment can help identify actual or potential cyber security lapses, areas that may be at risk, quantify remediation costs
Publish At:2015-01-28 19:55 | Read:1390 | Comments:0 | Tags:Main Feature Uncategorized Cyber Due Diligence M&A Merger we

Your New Years Resolution: Controlling Privileged Users

Posted January 27, 2015   Dave ShacklefordIs 2015 the year you get a better handle on security? The news last year was grim – so much so, in fact, that many in the information security community despaired a bit. Really, the end-of-the-year infosec cocktail parties were a bit glum. OK, let’s be honest, infosec cocktail parties are usually
Publish At:2015-01-27 21:55 | Read:1579 | Comments:0 | Tags:Privileged Account Management dave shackleford least privile

Life in the Fast Lane

By Chris Valasek @nudehaberdasherHi Internet Friends, Chris Valasek here. You may remember me from educational films such as “Two Minus Three Equals Negative Fun”. If you have not heard,  IOActive officially launched our Vehicle Security Service offering.I’ve received several questions about the service and plan to answer th
Publish At:2015-01-27 15:25 | Read:1386 | Comments:0 | Tags:Automotive CAN bus CAN hacking CAN network car hacking car s

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud