HackDig : Dig high-quality web security articles for hacker

The Blockchain Is Only as Strong as Its Weakest Link

This is the first installment in a three-part series. Blockchain-based applications will revolutionize the way people and organizations interact with each other and the Internet of Things (IoT) — and rightfully so. Based on the foundational principles of trust, blockchain has the potential to solve real-life business challenges within every sector. Permissio
Publish At:2017-10-27 14:00 | Read:3269 | Comments:0 | Tags:Banking & Financial Services Data Protection Blockchain Cryp

Investigating IoT Crime in the Age of Connected Devices

People are beginning to get used to the easy life enabled by smart homes and the Internet of Things (IoT), but they are at risk if they do not prioritize security. The IoT has increased quality of life for many; it has helped the differently abled and the elderly to continue living independently and laid the technological groundwork for another industrial re
Publish At:2017-10-27 14:00 | Read:3815 | Comments:0 | Tags:Fraud Protection Mobile Security Security Intelligence & Ana

Financial Institutions Join Forces to Solve the Intensifying Cloud Compliance Dilemma

The intensifying regulation of cloud services has become a major threat to financial institutions’ growth and innovation. An overwhelming number of regional and jurisdictional mandates aimed at ensuring cloud security, data protection and privacy are consuming company resources. Compliance with these evolving and often conflicting regulatory demands ha
Publish At:2017-10-26 19:35 | Read:4551 | Comments:0 | Tags:Banking & Financial Services Cloud Security Cloud Cloud Serv

Three Tips to Help Your Organization Hit Data Protection Out of the Park

When implementing a new business plan or technology, it’s easy to draw parallels between coaching employees on best practices and coaching an athletic team in pursuit of a victory. Both require teamwork, extensive training and careful consideration of how the individual strengths of each player come together to create a cohesive working unit. As the Ma
Publish At:2017-10-23 17:50 | Read:4624 | Comments:0 | Tags:Data Protection Cybersecurity Training Data Breach Data Secu

Practice: The Best Defense for Responding to Cyber Incidents

First responders have proven time and time again the valuable help they provide to people in need. Right now, we’re seeing their bravery with the historic hurricanes, fires and floods impacting millions of people. What makes first responders confident in the face of such danger? One word: practice. And this lesson is translating to the private sector i
Publish At:2017-10-22 05:00 | Read:3410 | Comments:0 | Tags:Banking & Financial Services Data Protection Incident Respon

How to Increase Transparency and Rebuild Trust After a Data Breach

As more companies suffer breaches and leak private data online, it becomes harder for organizations to be transparent and establish trust with their customers. Recent incidents have shown that many experts underestimated the total impact of a data breach in terms of the actual number of users affected and the volume of data made public. Many companies take t
Publish At:2017-10-22 05:00 | Read:4023 | Comments:0 | Tags:Application Security Data Protection Incident Response Data

In Its Fifth Year, European Cyber Security Month Shows Why Security Is a Shared Responsibility

October is European Cyber Security Month (ECSM). This marks the fifth anniversary of the initiative and builds on the activities started in previous years. The concept of a cybersecurity awareness month began in the U.S. 14 years ago with the aim of promoting cybersecurity for all computer users, from consumers to governments. Over time, many jurisdictions a
Publish At:2017-10-22 05:00 | Read:3955 | Comments:0 | Tags:Data Protection Cybersecurity Cybersecurity Jobs Cybersecuri

Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl

As organizations march into the digital age, data sprawl is accelerating. Information of all kinds is stored everywhere, accessed by multiple people many times a day and shared across corporate and international boundaries. Most organizations do not have a handle on data locations, ownership and flows outside of regulated or compliance-related information. T
Publish At:2017-10-05 16:00 | Read:3940 | Comments:0 | Tags:Data Protection Critical Data Crown Jewels Data Breach Data

POS Malware Breach Sees Payment Cards Hit Underground Shops

News about POS malware breaches affecting two retailers hit the headlines last week, this time featuring a fast-food restaurant chain in the U.S. that operates around 3,500 locations across the country, most of which are franchised, and a popular supermarket. Both entities, like others before them, were notified of suspicious activity by a third-party servic
Publish At:2017-10-04 03:05 | Read:5519 | Comments:0 | Tags:Data Protection Fraud Protection Malware Retail Threat Intel

How We Developed the IBM Security GDPR Framework

Why It’s So Hard to Design Something Simple In our previous blog post, Adam Nelson and I suggested that you set aside time with other people in your organization and familiarize yourselves with General Data Protection Regulation (GDPR) and its requirements. Have you done that yet? Don’t be embarrassed to admit that you haven’t. Because eith
Publish At:2017-10-02 14:15 | Read:5184 | Comments:0 | Tags:Data Protection Compliance Data Privacy General Data Protect

National Cyber Security Awareness Month: The 2017 Outlook

National Cyber Security Awareness Month (NCSAM) starts Monday, Oct. 2. It’s a joint effort between private industry and public agencies to help companies and individuals make better cybersecurity choices. Here’s a look at the current state of cybersecurity and what NCSAM has planned this year. An Evolving Outlook on Cybersecurity 2017 has been a
Publish At:2017-10-02 14:15 | Read:4047 | Comments:0 | Tags:Data Protection Risk Management Cybersecurity Cybersecurity

Back to Filing Cabinets? Simplifying the Complex Task of Data Security

Data drives our businesses, economy and daily lives, so it comes as no surprise that data security needs to be a priority. But do we know what data we really have, where sensitive information is being collected and stored, what is happening with the data and where it is ultimately going? How do we build security around critical assets that we need to protect
Publish At:2017-09-29 11:50 | Read:3942 | Comments:0 | Tags:Data Protection Data Classification Data Privacy Data Securi

Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges

Every chief information security officer (CISO) faces ongoing threats to his or her company’s assets. While some threats apply to every industry, IT security specialists in the health care, financial services, and energy and utilities sectors need to pay more attention to industry-specific security risks. Although these threats are most prevalent in th
Publish At:2017-09-26 09:56 | Read:2269 | Comments:0 | Tags:Banking & Financial Services CISO Energy & Utility Health Ca

Data Activity Monitoring Gives Health Care Organizations X-Ray Vision Into Medical Imaging Security Risks

In health care, cyberthreats pose a substantial risk to patient safety, systems of care and business continuity. The security of electronic medical information has a tremendous impact on data access, which directly affects quality of care, patients’ rights to privacy and the professional standing of health care organizations. Practitioners can only mak
Publish At:2017-09-25 15:30 | Read:2490 | Comments:0 | Tags:Data Protection Health Care Electronic Medical Records (EMRs

The Cloud Security Risks Hidden in Plain Sight

There are two popular attitudes about cloud security, and both of them are wrong. One belief is that putting data in the cloud amounts to putting it on the public internet for anyone to access. Therefore, the only way to keep data safe is to keep it at home and out of the cloud altogether. The opposite belief is that cloud providers cover their own bases wel
Publish At:2017-09-22 13:40 | Read:3253 | Comments:0 | Tags:Cloud Security Risk Management Access Management Cloud Cloud

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud