HackDig : Dig high-quality web security articles for hacker

When All Else Fails in Cybersecurity, Application Isolation Does Not

We hear about cybersecurity fails all the time. We’re happy to tell you it doesn’t have to be that way. Application isolation and containment based on virtualization is delivering results. The NSA has called out this strategy as the way forward for stopping advanced threats. To many technology folks, Application Isolation may be a new term when
Publish At:2017-07-26 12:05 | Read:270 | Comments:0 | Tags:Threats application isolation control demo government Isolat

Microsoft Office Malware Captured in a Micro-VM on an Unpatched Computer

The Bromium Labs team was able to get their hands on some live malware exploiting the Microsoft office vulnerability. First and foremost, on an unpatched workstation Bromium did its job by hardware isolating the Microsoft Word document into a protected virtual machine so that the host workstation was never infected. Secondly, it shows the amazing analytics
Publish At:2017-04-18 02:05 | Read:741 | Comments:0 | Tags:Breaking News Threats anti-virus command control EDR Events

CUI – Protect It or Lose the Business

I’m working with a couple of organizations faced with NIST 800-171 compliance. The first is a small manufacturing company doing business with a prime contractor. The second is a tribal business unit with federal contracts. Both must be compliant by December 2017 or risk losing their federal business.From what I can tell, neither organization was provided muc
Publish At:2016-07-28 10:55 | Read:783 | Comments:0 | Tags:Featured Articles Government control CUI Executive Order 125

We need more than just age limits to protect our children in social media

The European Union is preparing a new data protection package. It is making headlines because there are plans to raise the age limit for digital consent from 13 to 16 years. This has sometimes been describes as the age limit for joining social media. To be precise, member states could choose their age limit within this range. Younger kids would need parental
Publish At:2015-12-17 06:35 | Read:666 | Comments:0 | Tags:Family Protection Privacy Social media child children commun

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud