HackDig : Dig high-quality web security articles for hacker

How to Draft an Incident Response Policy

Section 1. IntroductionSimultaneously with their growing online presence, companies and individuals become increasingly susceptible to cyber-security attacks. Most organizations prefer to avoid and mitigate the damage caused by such attacks by establishing and implementing information security policies and plans.When drafting information security polic
Publish At:2017-09-18 17:00 | Read:100 | Comments:0 | Tags:Management Compliance & Auditing

Virtualization-Based Security is Helping Security Professionals Relax

Virtualization’s continued journey across the enterprise led inevitably to security Enhanced security benefits using virtualization are powerful and compelling Virtualization takes the security responsibility off users and delivers control to IT Detection-based security doesn’t work. It’s an exhausted concept. The battle’s been waged for 30 years and the c
Publish At:2017-08-03 12:45 | Read:624 | Comments:0 | Tags:Innovation cybersecurity detection intelligence management p

Proactive vs. Reactive Compliance Management

Much of my time spent working is focused on performing technology assessments against some kind of baseline. Most of the time, these are specific government or industry standards like HIPAA, NIST, ISO and PCI. But when some of my clients reach out to me about evaluating their environment in light of these standards, it’s often done out of a feeling of obliga
Publish At:2017-01-26 04:00 | Read:1122 | Comments:0 | Tags:Regulatory Compliance compliance Management risk

Identifying Cyber Risks: The Important Role of Senior Management

It is becoming more and more evident that cybersecurity is one of the focal points regarding security risks in the twenty-first century for all organisations.It is understandable that almost every organisation that has access to any kind of computing devices will be at risk and will probably experience harmful cyber incidents. Hackers, whether via individual
Publish At:2016-08-02 00:25 | Read:1126 | Comments:0 | Tags:Connecting Security to the Business Featured Articles Risk M

Entry Level Risk Management: Creating a First Security Risks Register

Organizations of all sizes apply risk management to their operations. In larger ones, this will normally be through a formal Enterprise Risk Management (ERM) methodology. An ERM can ensure higher level risks are left to senior managers, with lower-level risk decisions delegated to qualified people (i.e. through experience and training). In smaller orga
Publish At:2016-07-15 12:10 | Read:578 | Comments:0 | Tags:Management Compliance & Auditing

Legal Issues of New and Emerging Technologies

1. INTRODUCTION    12. PRIVACY ISSUES    12.1 Security vulnerabilities threatening the privacy of NET users    12.2 Using NET for unlawful surveillance    12.2.1 Unlawful use of beacons    12.2.2 Unlawful collection of personal data through social networking platforms    12.2.3 Unlawful use of RFID technology    13. ISSUES RELATED TO GATHERING EVIDENCE
Publish At:2016-02-24 20:05 | Read:1497 | Comments:0 | Tags:Management Compliance & Auditing

SAP Afaria Security: Attacking Mobile Device Management (MDM) Solution

It is known that the BYOD trend is changing the way enterprises are managed, delivered, and, most importantly, secured. While BYOD has its benefits, such as increased productivity, it poses security risks to the organization because of connections with the corporate network and access to corporate data. To minimize the threats, businesses should adopt
Publish At:2016-02-01 11:25 | Read:1146 | Comments:0 | Tags:Management Compliance & Auditing

Why ITIL, COBIT and Other Non-Infosec Based Frameworks Are Infosec’s Best Friends

As a current or aspiring security professional, you will know of a range of information security frameworks and enablers. These might include standards, e.g. ISO 27001, PCI DSS; risk management methodologies, e.g. Octave, IRAM 2, and security specific guidelines, e.g. the NIST Special Publications (SP) 800 series and Federal Information Processing Stan
Publish At:2016-01-26 10:45 | Read:1152 | Comments:0 | Tags:Management Compliance & Auditing

Breaking Bad Behavior: Why Non-SIEM Behavioral Analysis May Not Be All It’s Cracked Up to Be

Executive SummaryBehavioral Analysis is becoming a huge buzzword in the IT and Information Security industries. With the idea that you can automatically determine whether or not what’s going on within your network is legitimate or not is a huge benefit to any organization. But, challenges exist. The sheer volume of data available makes finding at
Publish At:2016-01-19 16:00 | Read:1232 | Comments:0 | Tags:Management Compliance & Auditing

More Executives Turn to Cyber Risk Transfer

As cyber threats grow in scope and potential impact, the complexity of enterprise digital data protection grows to astonishing proportions. Last year, a Fortune 500 survey revealed that cyber security is the second biggest concern for CEOs, who keep looking for new solutions to keep their data safe and their clients happy.The enterprise data is worth more t
Publish At:2016-01-06 02:10 | Read:1229 | Comments:0 | Tags:Featured Articles Security Awareness Cyber Risk insurance Ma

Tips for Being a Pragmatic CSO

The cybersecurity landscape is ever-changing, with new threats and technologies appearing every single day. There are more data breaches than ever, more compliance guidelines, and more new technology to secure in the workplace that has the potential to be misused by untrained employees. So why, then, does senior management tend to see security as an ov
Publish At:2015-10-21 08:50 | Read:988 | Comments:0 | Tags:Management Compliance & Auditing

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud