HackDig : Dig high-quality web security articles for hacker

How Not to Store Passwords: SHA-1 Fails Again

Problem: How do you store a password but make it nearly impossible to recover the plaintext in the event that the database with the password hash is compromised? When doing software development, it’s critical to review these functions. Having good development standards for your team will ensure that people store passwords properly and avoid mistakes th
Publish At:2017-11-07 04:05 | Read:565 | Comments:0 | Tags:Application Security Data Protection X-Force Research Applic

Getting a Grip on GDPR: The Secret Is Knowing Where to Begin

An old friend once gave me some really valuable advice about reaching a goal. He said that you can’t get to where you’re going if you don’t know where you are. Over the years, I’ve found that to be true in a lot of situations. But I think it’s especially fitting in discussing GDPR readiness. Know Where You Stand With GDPR Readin
Publish At:2017-11-06 09:40 | Read:347 | Comments:0 | Tags:Data Protection Compliance Cybersecurity Legislation Data Pr

The Power and Versatility of Pervasive Encryption

As cyberthreats make headlines, companies across the globe are working hard to develop efficient IT infrastructures capable of protecting sensitive data and maintaining compliance with privacy regulations. Although it checks both of these boxes, many organizations have been hesitant to adopt encryption due to cost, operational impact, the complexity of key m
Publish At:2017-11-04 02:00 | Read:261 | Comments:0 | Tags:Data Protection Mainframe Application Security Encryption En

The Blockchain Is Only as Strong as Its Weakest Link

This is the first installment in a three-part series. Blockchain-based applications will revolutionize the way people and organizations interact with each other and the Internet of Things (IoT) — and rightfully so. Based on the foundational principles of trust, blockchain has the potential to solve real-life business challenges within every sector. Permissio
Publish At:2017-10-27 14:00 | Read:168 | Comments:0 | Tags:Banking & Financial Services Data Protection Blockchain Cryp

Investigating IoT Crime in the Age of Connected Devices

People are beginning to get used to the easy life enabled by smart homes and the Internet of Things (IoT), but they are at risk if they do not prioritize security. The IoT has increased quality of life for many; it has helped the differently abled and the elderly to continue living independently and laid the technological groundwork for another industrial re
Publish At:2017-10-27 14:00 | Read:183 | Comments:0 | Tags:Fraud Protection Mobile Security Security Intelligence & Ana

Financial Institutions Join Forces to Solve the Intensifying Cloud Compliance Dilemma

The intensifying regulation of cloud services has become a major threat to financial institutions’ growth and innovation. An overwhelming number of regional and jurisdictional mandates aimed at ensuring cloud security, data protection and privacy are consuming company resources. Compliance with these evolving and often conflicting regulatory demands ha
Publish At:2017-10-26 19:35 | Read:404 | Comments:0 | Tags:Banking & Financial Services Cloud Security Cloud Cloud Serv

Three Tips to Help Your Organization Hit Data Protection Out of the Park

When implementing a new business plan or technology, it’s easy to draw parallels between coaching employees on best practices and coaching an athletic team in pursuit of a victory. Both require teamwork, extensive training and careful consideration of how the individual strengths of each player come together to create a cohesive working unit. As the Ma
Publish At:2017-10-23 17:50 | Read:151 | Comments:0 | Tags:Data Protection Cybersecurity Training Data Breach Data Secu

Practice: The Best Defense for Responding to Cyber Incidents

First responders have proven time and time again the valuable help they provide to people in need. Right now, we’re seeing their bravery with the historic hurricanes, fires and floods impacting millions of people. What makes first responders confident in the face of such danger? One word: practice. And this lesson is translating to the private sector i
Publish At:2017-10-22 05:00 | Read:187 | Comments:0 | Tags:Banking & Financial Services Data Protection Incident Respon

How to Increase Transparency and Rebuild Trust After a Data Breach

As more companies suffer breaches and leak private data online, it becomes harder for organizations to be transparent and establish trust with their customers. Recent incidents have shown that many experts underestimated the total impact of a data breach in terms of the actual number of users affected and the volume of data made public. Many companies take t
Publish At:2017-10-22 05:00 | Read:252 | Comments:0 | Tags:Application Security Data Protection Incident Response Data

In Its Fifth Year, European Cyber Security Month Shows Why Security Is a Shared Responsibility

October is European Cyber Security Month (ECSM). This marks the fifth anniversary of the initiative and builds on the activities started in previous years. The concept of a cybersecurity awareness month began in the U.S. 14 years ago with the aim of promoting cybersecurity for all computer users, from consumers to governments. Over time, many jurisdictions a
Publish At:2017-10-22 05:00 | Read:193 | Comments:0 | Tags:Data Protection Cybersecurity Cybersecurity Jobs Cybersecuri

Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl

As organizations march into the digital age, data sprawl is accelerating. Information of all kinds is stored everywhere, accessed by multiple people many times a day and shared across corporate and international boundaries. Most organizations do not have a handle on data locations, ownership and flows outside of regulated or compliance-related information. T
Publish At:2017-10-05 16:00 | Read:333 | Comments:0 | Tags:Data Protection Critical Data Crown Jewels Data Breach Data

POS Malware Breach Sees Payment Cards Hit Underground Shops

News about POS malware breaches affecting two retailers hit the headlines last week, this time featuring a fast-food restaurant chain in the U.S. that operates around 3,500 locations across the country, most of which are franchised, and a popular supermarket. Both entities, like others before them, were notified of suspicious activity by a third-party servic
Publish At:2017-10-04 03:05 | Read:373 | Comments:0 | Tags:Data Protection Fraud Protection Malware Retail Threat Intel

How We Developed the IBM Security GDPR Framework

Why It’s So Hard to Design Something Simple In our previous blog post, Adam Nelson and I suggested that you set aside time with other people in your organization and familiarize yourselves with General Data Protection Regulation (GDPR) and its requirements. Have you done that yet? Don’t be embarrassed to admit that you haven’t. Because eith
Publish At:2017-10-02 14:15 | Read:390 | Comments:0 | Tags:Data Protection Compliance Data Privacy General Data Protect

National Cyber Security Awareness Month: The 2017 Outlook

National Cyber Security Awareness Month (NCSAM) starts Monday, Oct. 2. It’s a joint effort between private industry and public agencies to help companies and individuals make better cybersecurity choices. Here’s a look at the current state of cybersecurity and what NCSAM has planned this year. An Evolving Outlook on Cybersecurity 2017 has been a
Publish At:2017-10-02 14:15 | Read:365 | Comments:0 | Tags:Data Protection Risk Management Cybersecurity Cybersecurity

Back to Filing Cabinets? Simplifying the Complex Task of Data Security

Data drives our businesses, economy and daily lives, so it comes as no surprise that data security needs to be a priority. But do we know what data we really have, where sensitive information is being collected and stored, what is happening with the data and where it is ultimately going? How do we build security around critical assets that we need to protect
Publish At:2017-09-29 11:50 | Read:288 | Comments:0 | Tags:Data Protection Data Classification Data Privacy Data Securi

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud