HackDig : Dig high-quality web security articles for hackers

Cybersecurity Strategy: Building Trust on Shifting Sands

This is the first in a blog series about building and maintaining brand trust.  Transforming the enterprise for digital business requires a change in technology, process and culture. Along with this comes necessary changes on a cybersecurity strategy. Like walking on shifting sands, keeping cybersecurity strategy top of mind while going through major b
Publish At:2020-10-27 20:34 | Read:337 | Comments:0 | Tags:Application Security Cloud Security Risk Management Security

Creating Brand Trust: A Key Currency for Business

This is the first in a blog series about building and maintaining brand trust.  Brand trust has always been valuable for business, but the ways to develop it have changed a lot in the digital age. I’ve seen a dramatic shift in the last twenty years while I’ve worked in technology and development. In terms of both my personal and professiona
Publish At:2020-09-17 12:45 | Read:450 | Comments:0 | Tags:Data Protection Identity & Access Zero Trust digital trust C

Achieve Flexibility in Business Through Digital Trust and Risk Management

I grew up watching professional football back in the 70s, when defenses were so good they had their own nicknames. The Pittsburgh Steelers had the “Steel Curtain,” the Miami Dolphins had the “No-Name Defense” and the Dallas Cowboys had the “Doomsday Defense.” The Cowboys’ defense was based on a newfangled concept cal
Publish At:2020-04-21 10:39 | Read:1171 | Comments:0 | Tags:CISO digital trust Business Continuity Customer Experience D

Take a Data-Centric Approach to Zero Trust to Protect Your Most Critical Assets

For many of us, children are our most critical assets. In order to protect what is important to us, we work hard to know where they are and what they are doing at all times — particularly during those pesky teen years. We also take steps to protect the places where they spend their time. We install cameras, locks and alarm systems to monitor activity and sec
Publish At:2020-04-13 06:40 | Read:1189 | Comments:0 | Tags:Data Protection digital trust Cloud Cloud Security Critical

Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security

Artificial intelligence (AI) isn’t new. What is new is the growing ubiquity of AI in large organizations. In fact, by the end of this year, I believe nearly every type of large organization will find AI-based cybersecurity tools indispensable. Artificial intelligence is many things to many people. One fairly neutral definition is that it’s a bran
Publish At:2020-02-09 10:30 | Read:1247 | Comments:0 | Tags:Artificial Intelligence Data Protection Identity & Access di

What Leadership Qualities for CISOs Are Most Important in 2020?

Organizations today have to balance the need for continuous evolution along the digital continuum with the need to protect their data and operations and keep cyber risk at an acceptable level. The chief information security officer (CISO) role is uniquely positioned to help organizations manage those dualities, but it requires a different set of leadership q
Publish At:2020-02-09 10:30 | Read:1057 | Comments:0 | Tags:CISO digital trust Business Continuity C-Suite Chief Informa

How Authentication and Identification Work Together to Build Digital Trust

The dictionary definition of trust, according to Merriam-Webster, is the “assured reliance on the … truth of someone or something.” In today’s digital world, trust can be a tricky concept. To do business online, whether you are a bank, retailer, insurer, airline or anything else, you must have some degree of trust in your user — trust
Publish At:2019-10-18 10:20 | Read:1677 | Comments:0 | Tags:Fraud Protection Identity & Access Access Governance digital


Tag Cloud