HackDig : Dig high-quality web security articles for hackers

Cybersecurity Risk Management: Protecting Our Most Valuable Currency

Cybersecurity risk management can be a unifying conversation throughout your organization. Few things are more challenging in the cybersecurity business than getting stakeholders to speak in the same language. The business planners are talking supply and demand; the IT department is talking bits and bytes; the HR department is talking wellness and productiv
Publish At:2020-09-30 12:45 | Read:43 | Comments:0 | Tags:Data Protection Risk Management Cybersecurity Data Security

Ransomware Attacks: How to Protect your Data With Encryption

Cybercriminals are making headlines using ransomware to block organizations from accessing their own critical business data to extort ransoms. Recently, the University of California San Francisco fell victim to a ransomware attack on key academic and research data (the institution is known to be working on a cure for COVID-19) and ended up paying over $1.14
Publish At:2020-09-04 12:08 | Read:215 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Malware Mob

Digital Transformation: Breaking Down Silos for Better Data Security

Today, enterprises are under pressure to improve the power and reduce the cost of running mission-critical business applications by migrating to modern software architectures. By breaking down the silos between adjacent teams and the tools they use, security teams can do this at the same time as they take steps toward zero trust and true security unificatio
Publish At:2020-08-20 08:22 | Read:323 | Comments:0 | Tags:Cloud Security Data Protection Zero Trust Multicloud Cyberse

Data Democratization: Balancing Risk vs Reward Through Data Governance

Expanding employees’ access to the company’s data, known as data democratization, can be controversial. A more open attitude to data within the enterprise can give people the tools to fuel innovation and improve their bottom lines. However, it also can pose problems with security if not properly rolled out. As businesses work towards unleashing
Publish At:2020-08-11 07:00 | Read:280 | Comments:0 | Tags:Uncategorized Data Protection Data Security Governance Risk

How Employing Encryption for Data Security Changed History

Human history is full of examples of encryption playing pivotal roles in war, competition and transitions of power. Throughout recorded time, people have employed encryption as a tactical tool to keep information private. That data could involve military campaigns, plots to overthrow political leaders or political dealings. In some cases, the use of en
Publish At:2020-08-03 12:25 | Read:263 | Comments:0 | Tags:Data Protection Cybersecurity data encryption Data Security

Cybersecurity Baseline for IoT Device Manufacturers

The pervasive impact of Internet of Things (IoT) devices on our lives is greater than that of traditional IT devices. There are several unknowns in IoT security, and it raises concerns for customers who are looking to incorporate IoT devices in their existing infrastructure. Fortunately, security by design can resolve some of the major root causes of the und
Publish At:2020-07-31 03:11 | Read:259 | Comments:0 | Tags:Internet of Things baseline data security device security Io

Assisted Living Services Provider Discloses Data Security Incident

An assisted living services provider in Maryland revealed a data security incident in which attackers encrypted some of its information.In an update posted to its website, Lorien Health Services revealed that the security incident had occurred back on June 6. As quoted from its statement:Upon detecting the incident, Lorien immediately engaged a team of cyber
Publish At:2020-07-21 07:41 | Read:241 | Comments:0 | Tags:IT Security and Data Protection Latest Security News assiste

Mitigating Container Risk Requires a Comprehensive Approach

Containers have become a staple among large banks and financial services firms, which have used the technology in production. It has captured the attention of the broader market, that hopes to achieve the same technology benefits of improved application delivery and run-time efficiencies. This modular plug-and-play architecture is more scalable and can deliv
Publish At:2020-07-17 14:07 | Read:327 | Comments:0 | Tags:Banking & Financial Services Cloud Security Data Protection

6 Cloud Security Threats Healthcare Companies May Face – With Solutions

For healthcare organizations that handle a lot of patient data, including very sensitive information, cloud computing is a revolution to data storage. Cloud computing in healthcare lowers data storage costs (compared to the old paper-storage era), enables easy retrieval of patient data and also improves the privacy of patient information. This has inevitably
Publish At:2020-07-15 01:07 | Read:308 | Comments:0 | Tags:Featured Articles Healthcare Cloud Cyberattacks Data Breache

Overcoming Data Security Challenges in a Hybrid, Multicloud World

Cloud computing is evolving at a rapid pace. Today, there’s a range of choices for moving applications and data to cloud that includes various deployment models from public and private to hybrid cloud service types. Organizations are seeking ways to utilize multiple clouds as part of a broader digital strategy. With a multicloud approach, companies can avoid
Publish At:2020-07-09 13:35 | Read:364 | Comments:0 | Tags:Cloud Security Data Protection Data Security Hybrid Cloud In

Best Practices for Managing Data Privacy & Responding to Privacy Breaches

A constantly changing regulatory environment has become the “new normal” for data privacy, and 2020 is no exception. The California Consumer Privacy Act (CCPA) went into effect in January and introduced one of the most sweeping requirements the U.S. has seen at a state level. In addition, the global health crisis has seen concerns around new and emerging use
Publish At:2020-06-18 12:15 | Read:451 | Comments:0 | Tags:Data Protection Risk Management Data Breach Data Privacy Dat

Ginp Malware Operations are on the Rise, Aiming to Expand in Turkey

The Ginp mobile banking malware, which emerged in late 2019, is one of the top most prevalent Android banking malware families today. It started as a simple short message server (SMS) stealer and rapidly evolved into one of the most advanced actors in the financial fraud landscape. Ginp has primarily targeted Spanish banks, but recent evidence suggests the m
Publish At:2020-06-18 12:15 | Read:297 | Comments:0 | Tags:Application Security Banking & Financial Services Data Prote

Why NHS, UK Healthcare Orgs Need to Boost Their Security in Age of COVID-19

All National Health Service (NHS) and social care organisations in the United Kingdom have always been and will always be a target for bad actors. The nature of their business and the sensitive data they hold make these entities appealing to bad actors who know that legacy systems, and/or, not regularly patched systems, such as those employed by healthcare o
Publish At:2020-06-04 04:29 | Read:386 | Comments:0 | Tags:Healthcare data security legacy systems NHS

Managed Data Activity Monitoring (DAM) Is More Important Than Ever

The transition to a remote workforce has happened so quickly that many security teams have not had an opportunity to apply desired controls. Organizations are dealing with remote access and execution privileges that were unplanned even a couple of months ago. The use of personal devices and home workspaces has increased potential risks. Typical controls such
Publish At:2020-06-03 09:20 | Read:352 | Comments:0 | Tags:Data Protection Risk Management Security Services Compliance

Protecting Fleet Data from Security Threats

Big data is revolutionizing fleet management — specifically in the form of telematics.From engine diagnostics that track fuel efficiency and mileage to sensors that detect aggressive driving behavior and interior vehicle activity, this information is so valuable that we’re quickly approaching the point where connected technology will come standard in every v
Publish At:2020-05-26 23:35 | Read:398 | Comments:0 | Tags:Internet of Things IT Security and Data Protection Big Data


Tag Cloud