HackDig : Dig high-quality web security articles for hacker

McAfee Up Levels Insights for Customers

Authored by Anand Ramanathan McAfee recently announced MVISION Insights designed to help customers proactively detect, rank and respond quickly and accurately to threats. On top of having to respond to threats that persistently target their companies, security professionals also face another huge challenge – prioritizing what threat information is relevant f
Publish At:2019-12-06 16:45 | Read:208 | Comments:0 | Tags:Enterprise

As Vendors Talk WannaCry, We Want You to Know What You Can Expect from Bromium

As WannaCry went nuts last week and everyone moved quickly to support one another; we all moved on our best intelligence at the time. Because most ransomware is typically delivered via email, website or file, we worked with our customers to make sure their endpoints were protected. One week later, I wanted to take a moment to be absolutely transparent about
Publish At:2017-05-20 10:20 | Read:4203 | Comments:0 | Tags:Company News breach crypto-malware detection enterprise Isol

Mobile, Smartphone & BYOD

Owing to the development of mobile devices, people nowadays are overwhelmed by tons of information on the go. Curiously, despite being distracted by this constant flow of information, people are so mesmerized by it that they cannot break free from this lifestyle. Modern life is fast-paced and being mobile is the norm today. Mobile technology gradually
Publish At:2017-03-23 16:30 | Read:6498 | Comments:0 | Tags:Enterprise

SecurityIQ Launches Custom Training Module Delivery Feature

InfoSec Institute is excited to announce the immediate availability of custom training module delivery for SecurityIQ users. This new feature allows customers using AwareEd, to quickly upload, manage, deliver, and report on their own custom training modules in addition to the world class training content provided by InfoSec Institute. These custom modu
Publish At:2016-12-13 18:15 | Read:4576 | Comments:0 | Tags:Enterprise Phishing Simulated Phishing Campaigns

Risk Management: Aligning Information Security Activities with the Enterprise

In any organisation, even the most uncomplicated business decisions have their associated risks. Such risks involve people, processes and technology, and they must be systematically identified and addressed on time and on budget.Risk management, as we know, is a process through which the uncertainties around delivering an objective are managed.Information Se
Publish At:2016-11-22 05:30 | Read:3705 | Comments:0 | Tags:Featured Articles Risk-Based Security for Executives Enterpr

The Impact of Automation on the IT Security Job Market

The growing influence of automation on daily life is noticeable everywhere. The news is full of job-cut announcements, often justified by automation projects. Self-serve cash registers at supermarkets have become the norm in the west. Physiotherapists pull out exercises for common issues from an automated computer program. These are examples of tasks t
Publish At:2016-10-26 16:30 | Read:3540 | Comments:0 | Tags:Enterprise

Enterprises: Only paying attention to big-name hacks? You may be missing the point

Security professionals are more likely to pay attention to breaches if the companies being breached already have recognizable names. Seems like common sense. You see a headline that says, “Target point of sale technology hacked,” you’re much more likely to pay attention than, “Hospital in Kentucky suffers from ransomware attack.” Unless you live in Kentucky
Publish At:2016-09-21 18:05 | Read:3543 | Comments:0 | Tags:Enterprise Mobile Security Security breach fatigue breaches

SecurityIQ Case Study – Westcon Group

I’m sure you’ve noticed that we’ve been writing a lot about security awareness and phishing lately. Our team has been working hard on our SecurityIQ offering and it has been gaining traction with some leading global organizations.It requires no setup to get started and is completely free to try. If you’re curious as to how other
Publish At:2016-08-30 05:25 | Read:4012 | Comments:0 | Tags:Enterprise Hacking

Now available: The Practical Guide to Enterprise Mobile Security

The Practical Guide to Enterprise Mobile Security is a one-stop shop for enterprise IT teams looking to enable mobile productivity in their organizations, while simultaneously reducing the risks inherent to mobile devices. In it, you’ll get actionable information on every element of mobile security from what threats look like on mobile to how to buy a mobil
Publish At:2016-08-10 20:55 | Read:3492 | Comments:0 | Tags:Enterprise Mobile Security EMM enteprise mobile security ent

The Cyber Enemy within: Rise of Insider Threat

Around the world, many countries are spending millions of dollars to protect themselves from cyber crime/fraud. Unfortunately, attackers seem to be succeeding in stealing the information and causing harm to the companies. The insider threat is one of the core reasons for their success.There are always some security flaws or backdoors that are used to b
Publish At:2016-07-18 13:15 | Read:4279 | Comments:0 | Tags:Enterprise

New Mac OS X Remediation Offering and Forensics Capabilities for Enterprise

At Malwarebytes, our mission is to protect consumers and businesses from the most dangerous cyber threats. Today, we announced a new solution that will dramatically change endpoint detection and response (EDR) for Mac users – a growing target area for hackers. The fact that Mac users are safe from cyber threats is a common misconception. While it’s true that
Publish At:2016-05-26 18:05 | Read:3252 | Comments:0 | Tags:CEO announcements Malwarebytes news Apple business endpoint

Channel bets on mobile security: Lookout & Ingram Micro team up to protect the enterprise

Emerging technologies are not often adopted by the channel, but Lookout’s enterprise mobility solutions have made the cut. Today, Lookout is excited to announce a strategic alliance with channel-heavyweight Ingram Micro, opening the door that connects our products to the customers who need them most even wider. From the start, Lookout has been uniquely dev
Publish At:2016-01-14 01:55 | Read:2994 | Comments:0 | Tags:Lookout News channel enterprise Ingram Micro mobile security

Risky v. Malicious apps: How they’re different & why you need to care about both

There’s a hidden challenge enterprises face when securing mobile devices: some apps that are legitimate and useful in a personal context may introduce a major risk for an enterprise. While it may not be immediately evident, there are in fact two different categories of harmful applications to an enterprise: malicious apps and risky apps. As the person respon
Publish At:2015-10-13 13:15 | Read:2829 | Comments:0 | Tags:Enterprise Mobile Security enterprise malicious apps risky a

The Death of the Full Stack Developer

When I got started in computer security, back in 1995, there wasn’t much to it — but there wasn’t much to web applications themselves. If you wanted to be a web application developer, you had to know a few basic skills. These are the kinds of things a developer would need to build a somewhat complex website back in the day: ISP/Service Provide
Publish At:2015-08-28 14:30 | Read:3334 | Comments:0 | Tags:Industry Observations Technical Insight Vulnerabilities Web

How Non-Google experience devices are gaining traction, and posing risk to the enterprise

The mobile ecosystem is moving toward economical smartphones. They are customizable and much more affordable than the $600 plus Android phones you might see on the market. This poses a problem for enterprises which, to date, have relied on the app testing and vetting process applied to Google Experience devices, and the fact that app downloads on these devi
Publish At:2015-08-13 01:50 | Read:3528 | Comments:0 | Tags:Security enterprise vetting


Share high-quality web security related articles with you:)


Tag Cloud