HackDig : Dig high-quality web security articles for hackers

Consumerization: a better way to answer cybersecurity challenges

A version of this article originally appeared in Forbes on February 12, 2020. Consumerization: The specific impact that consumer-originated technologies can have on enterprises. Gartner More and more, enterprises are coming to understand that they need to adopt the agile processes and product strategies of startups in order to compete in today’s m
Publish At:2020-03-25 14:34 | Read:407 | Comments:0 | Tags:Opinion business cyberattacks business cyberthreats consumer

Securing the MSP: best practices for vetting cybersecurity vendors

Ironically, to keep costs low for their enterprise and mid-market clients, managed service providers (MSPs) are some of the most reliant on third-party vendors—including those providing security. While this is generally not an indication of dysfunction or vulnerability, the responsible MSP will be looking with a critical eye while vetting cybersecurity vendo
Publish At:2020-03-11 13:20 | Read:556 | Comments:0 | Tags:Business cybersecurity vendors enterprise managed service pr

McAfee Up Levels Insights for Customers

Authored by Anand Ramanathan McAfee recently announced MVISION Insights designed to help customers proactively detect, rank and respond quickly and accurately to threats. On top of having to respond to threats that persistently target their companies, security professionals also face another huge challenge – prioritizing what threat information is relevant f
Publish At:2019-12-06 16:45 | Read:536 | Comments:0 | Tags:Enterprise

As Vendors Talk WannaCry, We Want You to Know What You Can Expect from Bromium

As WannaCry went nuts last week and everyone moved quickly to support one another; we all moved on our best intelligence at the time. Because most ransomware is typically delivered via email, website or file, we worked with our customers to make sure their endpoints were protected. One week later, I wanted to take a moment to be absolutely transparent about
Publish At:2017-05-20 10:20 | Read:4868 | Comments:0 | Tags:Company News breach crypto-malware detection enterprise Isol

Mobile, Smartphone & BYOD

Owing to the development of mobile devices, people nowadays are overwhelmed by tons of information on the go. Curiously, despite being distracted by this constant flow of information, people are so mesmerized by it that they cannot break free from this lifestyle. Modern life is fast-paced and being mobile is the norm today. Mobile technology gradually
Publish At:2017-03-23 16:30 | Read:7536 | Comments:0 | Tags:Enterprise

SecurityIQ Launches Custom Training Module Delivery Feature

InfoSec Institute is excited to announce the immediate availability of custom training module delivery for SecurityIQ users. This new feature allows customers using AwareEd, to quickly upload, manage, deliver, and report on their own custom training modules in addition to the world class training content provided by InfoSec Institute. These custom modu
Publish At:2016-12-13 18:15 | Read:5028 | Comments:0 | Tags:Enterprise Phishing Simulated Phishing Campaigns

Risk Management: Aligning Information Security Activities with the Enterprise

In any organisation, even the most uncomplicated business decisions have their associated risks. Such risks involve people, processes and technology, and they must be systematically identified and addressed on time and on budget.Risk management, as we know, is a process through which the uncertainties around delivering an objective are managed.Information Se
Publish At:2016-11-22 05:30 | Read:5833 | Comments:0 | Tags:Featured Articles Risk-Based Security for Executives Enterpr

The Impact of Automation on the IT Security Job Market

The growing influence of automation on daily life is noticeable everywhere. The news is full of job-cut announcements, often justified by automation projects. Self-serve cash registers at supermarkets have become the norm in the west. Physiotherapists pull out exercises for common issues from an automated computer program. These are examples of tasks t
Publish At:2016-10-26 16:30 | Read:4027 | Comments:0 | Tags:Enterprise

Enterprises: Only paying attention to big-name hacks? You may be missing the point

Security professionals are more likely to pay attention to breaches if the companies being breached already have recognizable names. Seems like common sense. You see a headline that says, “Target point of sale technology hacked,” you’re much more likely to pay attention than, “Hospital in Kentucky suffers from ransomware attack.” Unless you live in Kentucky
Publish At:2016-09-21 18:05 | Read:3851 | Comments:0 | Tags:Enterprise Mobile Security Security breach fatigue breaches

SecurityIQ Case Study – Westcon Group

I’m sure you’ve noticed that we’ve been writing a lot about security awareness and phishing lately. Our team has been working hard on our SecurityIQ offering and it has been gaining traction with some leading global organizations.It requires no setup to get started and is completely free to try. If you’re curious as to how other
Publish At:2016-08-30 05:25 | Read:4463 | Comments:0 | Tags:Enterprise Hacking

Now available: The Practical Guide to Enterprise Mobile Security

The Practical Guide to Enterprise Mobile Security is a one-stop shop for enterprise IT teams looking to enable mobile productivity in their organizations, while simultaneously reducing the risks inherent to mobile devices. In it, you’ll get actionable information on every element of mobile security from what threats look like on mobile to how to buy a mobil
Publish At:2016-08-10 20:55 | Read:3994 | Comments:0 | Tags:Enterprise Mobile Security EMM enteprise mobile security ent

The Cyber Enemy within: Rise of Insider Threat

Around the world, many countries are spending millions of dollars to protect themselves from cyber crime/fraud. Unfortunately, attackers seem to be succeeding in stealing the information and causing harm to the companies. The insider threat is one of the core reasons for their success.There are always some security flaws or backdoors that are used to b
Publish At:2016-07-18 13:15 | Read:5297 | Comments:0 | Tags:Enterprise

New Mac OS X Remediation Offering and Forensics Capabilities for Enterprise

At Malwarebytes, our mission is to protect consumers and businesses from the most dangerous cyber threats. Today, we announced a new solution that will dramatically change endpoint detection and response (EDR) for Mac users – a growing target area for hackers. The fact that Mac users are safe from cyber threats is a common misconception. While it’s true that
Publish At:2016-05-26 18:05 | Read:3607 | Comments:0 | Tags:CEO announcements Malwarebytes news Apple business endpoint

Channel bets on mobile security: Lookout & Ingram Micro team up to protect the enterprise

Emerging technologies are not often adopted by the channel, but Lookout’s enterprise mobility solutions have made the cut. Today, Lookout is excited to announce a strategic alliance with channel-heavyweight Ingram Micro, opening the door that connects our products to the customers who need them most even wider. From the start, Lookout has been uniquely dev
Publish At:2016-01-14 01:55 | Read:3267 | Comments:0 | Tags:Lookout News channel enterprise Ingram Micro mobile security

Risky v. Malicious apps: How they’re different & why you need to care about both

There’s a hidden challenge enterprises face when securing mobile devices: some apps that are legitimate and useful in a personal context may introduce a major risk for an enterprise. While it may not be immediately evident, there are in fact two different categories of harmful applications to an enterprise: malicious apps and risky apps. As the person respon
Publish At:2015-10-13 13:15 | Read:3170 | Comments:0 | Tags:Enterprise Mobile Security enterprise malicious apps risky a


Share high-quality web security related articles with you:)


Tag Cloud