HackDig : Dig high-quality web security articles

Reactive vs. proactive security: Three benefits of a proactive cybersecurity strategy

Introduction I’ve been writing cybersecurity articles for many years, and in that time, I have only seen increasingly complex security threats. Cybercriminals take their craft seriously. They treat cybercrime as a business, looking for ways to maximize profit while seeking innovative methods to circumvent our efforts to protect our businesses.The figur
Publish At:2020-10-22 09:20 | Read:2006 | Comments:0 | Tags:General Security security cyber cybersecurity

2020 Verizon Data Breach Investigations Report: Summary and key findings for security professionals

IntroductionThe Verizon Data Breach Investigations Report, or the Verizon Data Breach Report, is an annual report intended for information security professionals. It summarizes 3,950 confirmed data breaches and is a collection of work from 81 contributors spanning 81 countries and has grown more than a little bit since last year’s twelfth edition. Navi
Publish At:2020-10-21 12:23 | Read:1792 | Comments:0 | Tags:General Security security

Implementing a zero-trust model: The key to securing microservices

IntroductionOrganizations are increasingly integrating microservices into their software development processes. As noted by DZone, microservices break down software into multiple component services, thereby enabling organizations to deploy parts of an application without compromising the integrity of the entire program. This property also allows develo
Publish At:2020-10-20 09:05 | Read:3269 | Comments:0 | Tags:General Security

Cost of non-compliance: 8 largest data breach fines and penalties

IntroductionDifferent regulations and laws will slap organizations with fines and penalties for data breaches. This is because the organization did not take the privacy of their data seriously. However, the authorities take this responsibility very seriously and will not hesitate to punish with fines and penalties that are sometimes in the hundreds of
Publish At:2020-10-20 09:05 | Read:1949 | Comments:0 | Tags:General Security

Japan’s IoT scanning project looks for vulnerable IoT devices

The growing world of IoT — and security concernsThe Internet of Things (IoT) is still a baby compared to other computing technologies, but the market has already exploded and continues to expand at a healthy pace. Telecommunications giant Ericsson estimates the number of IoT connections to grow from 10.8 billion in 2019 to 24.9 billion in 2025, or a 15
Publish At:2020-10-14 12:41 | Read:2135 | Comments:0 | Tags:General Security

How to create a subdomain enumeration toolkit

IntroductionA domain name is an important part of the reconnaissance process during a security assessment or even for many bug bounty challenges. In this article, we’ll look at how a domain can be classified. Within this context, two scenarios of how to take advantage of domain misconfigurations will be analyzed. Finally, we’ll discuss building a subdo
Publish At:2020-10-14 12:41 | Read:1814 | Comments:0 | Tags:General Security

Are open-source security tools secure? Weighing the pros and cons

IntroductionThere is a myth that good security solutions are necessarily expensive, but the truth is that there are many options, not only at low cost, but even excellent free tools that can be employed to protect most businesses.A good example of this is OWASP’s list of free for Open Source Application Security Tools, which includes solutions fo
Publish At:2020-10-06 11:20 | Read:2097 | Comments:0 | Tags:General Security security

The business value of CompTIA CySA+ employee certification

IntroductionThe cybersecurity threat landscape is rapidly evolving, and cybercriminals are becoming more sophisticated. Traditional threat detection techniques that rely on signature-based threat detection are no longer effective. In fact, signature-based antivirus systems were only capable of detecting and blocking half of malware in the last quarter
Publish At:2020-09-30 12:31 | Read:1722 | Comments:0 | Tags:General Security

Top 7 cybersecurity books for IT auditors in 2020

IntroductionBefore delving into top cybersecurity books for IT auditors, it is essential to have a short look at who IT auditors are.IT auditors are responsible for examining and evaluating the enterprise’s IT policies, operations and technological infrastructure. They make sure that corporate assets are properly protected and that data integrity is en
Publish At:2020-09-10 14:45 | Read:2163 | Comments:1 | Tags:General Security security cyber cybersecurity

13 common web app vulnerabilities not included in the OWASP Top 10

IntroductionThe OWASP Top 10, a widely referenced document that lists the key threats to modern web applications, hasn’t changed much in the past few years. Broken access controls, cross-site scripting, insecure configuration, broken authentication — these are some of the risks we’ve been constantly warned about since 2003. The issue with this is that
Publish At:2020-09-09 09:18 | Read:2184 | Comments:0 | Tags:General Security

Top 16 cybersecurity websites: Cybersecurity forums, subreddits for IT and security professionals and more

Introduction: Why use cybersecurity forums and subreddits for continuing education?Cybersecurity continues to be one of the most strategically important issues in the digital world today and is also a field in which professionals are challenged by the fast pace in which technology and scenarios continue to change. Cybersecurity experts are asked to con
Publish At:2020-09-08 17:40 | Read:3311 | Comments:0 | Tags:General Security security cyber cybersecurity

52 NICE Cybersecurity Workforce Framework work roles: What you need to know

IntroductionIn the US, Chinese restaurant menus usually have many combination plates available for lunch or dinner, each representing a particular grouping of ingredients in a specific ratio. These combinations can grow to huge numbers, sometimes into the hundreds at particularly busy restaurants. Having common reference points for these particular com
Publish At:2020-09-08 17:40 | Read:2354 | Comments:0 | Tags:General Security security cyber cybersecurity

Lessons not learned? Another Marriott data breach

IntroductionMarriott is one of the best-known leisure brands in the world, specifically in the hotel and hospitality industry. It has over 7,300 hotels and guest properties globally in over 134 countries. Marriott also has many other well-known brand names within the group, such as Sheraton Hotels and Resorts and Westin Hotels and Resorts. The Marriott
Publish At:2020-09-07 10:23 | Read:2694 | Comments:0 | Tags:General Security

Online certification opportunities: 4 more vendors offer online certification exams

Introduction: Get certified from home during the COVID-19 pandemicEnabling employees to work from home during the COVID-19 outbreak has not only allowed employers to ensure the safety and well-being of staff with less impact on productivity and operations. It has also provided an occasion to upskill their current talents by allowing them to engage in c
Publish At:2020-08-25 09:48 | Read:5254 | Comments:0 | Tags:General Security

DevOps, SecOps, DevSecOps, PrivacyOps & AIOps: What’s the difference?

IntroductionMany people often wonder about what DevOps is and what a DevOps engineer actually does. DevOps tools range from scripts to applications and systems to help automate and integrate development procedures within an IT operations environment. We have gathered a list of useful information and we hope to give you a better idea as to what the DevO
Publish At:2020-08-25 09:48 | Read:3234 | Comments:0 | Tags:General Security


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud