HackDig : Dig high-quality web security articles for hackers

Industrial Cybersecurity and the Florida Water Supply Attack with Dale Peterson

Through the lens of the Florida water supply hack, Dale Peterson teaches how events like these remind us to take the necessary steps to maintain our cybersecurity. Founder and chair of S4 Events, Dale has been helping security professionals effectively and efficiently manage risk to their critical assets for over 15 years.Spotify: https://open.spotify.com/sh
Publish At:2021-02-22 08:08 | Read:145 | Comments:0 | Tags:Podcast Critical Infrastructure cyberattack remote access wa

Industrial Remote Access: Why It’s Not Something to Fear

Increased uptime? Check. Better access to outside expertise? Check. Improved first-time-fix rate? Check.These are just some of the benefits of industrial remote access. Yet many customers are reluctant to embrace remote access. Not only that, but incidents such as the breach at the Oldsmar water utility might increase organizations’ reluctance to use remote
Publish At:2021-02-18 06:38 | Read:147 | Comments:0 | Tags:ICS Security MFA remote access Utilities water

Remote Work Trends: How Cloud Computing Security Changed

Looking back on 2020, we can honestly say it was a year like no other. We faced wildfires, hurricanes, a raucous election season and, of course, a pandemic that forced millions of people to work, socialize and attend school from home. For cybersecurity teams, 2020 presented a unique challenge. How do you continue to offer defenses for networks and data when
Publish At:2021-02-05 14:35 | Read:180 | Comments:0 | Tags:Cloud Security remote workforce Cybersecurity Remote Access

Acceso Remoto Seguro: Por que es importante y por que hay que hacerlo bien

Con la llegada de COVID-19  las organizaciones de todo el mundo fueron obligadas a hacer la transición de sus empleados a trabajar desde casa, en un momento en que la infraestructura de red de las organizaciones es más compleja que nunca. Esta complejidad no es única de los entornos de IT. De hecho, las máquinas y los procesos de producción también se e
Publish At:2020-12-30 09:20 | Read:306 | Comments:0 | Tags:Featured Articles Spanish operational technology remote acce

3 Zones that Require Network Security for Industrial Remote Access

By now, we have a good understanding of what secure remote access (SRA) is and why organizations might choose to enable it for their OT environments. We also know that securing IT-OT collaboration, leveraging guidance from best practice frameworks and using an automated solution can help organizations to implement this type of access. Even so, we still don’t
Publish At:2020-10-19 01:49 | Read:575 | Comments:0 | Tags:ICS Security Industrial operational technology remote access

Endpoint Security Using AI & MITRE For Your Remote Workforce

As employees increasingly work remotely, it is more important than ever to maintain visibility and threat detection in a remote working world. We have seen a significant increase in state-sponsored attacks and malicious phishing campaigns, and this trend is expected to continue. This period of remote work is a good time for enterprise to make sure endpoint
Publish At:2020-08-06 09:54 | Read:755 | Comments:0 | Tags:Endpoint remote workforce Endpoint Security Remote Access Th

Secure Remote Access: Why It’s Important and How to Do It Right

COVID-19 forced organizations all over the world to transition their employees to a work-from-home policy. That change came at a time when organizations’ connected infrastructure is more complex than ever. Such complexity doesn’t just extend across IT environments, either. Indeed, machines and production processes are also becoming increasingly complex as or
Publish At:2020-08-05 00:35 | Read:877 | Comments:0 | Tags:Featured Articles IT Security and Data Protection operationa

Shift Your Cybersecurity Mindset to Maintain Cyber Resilience

As the business world navigates the ups and downs of today’s economy, a mindset shift is required to maintain cyber resilience. Cybersecurity, often an afterthought in a strong economy, must not be neglected in responding to shifts in the business landscape. As more companies expand their remote workforce, the number of endpoints with access to corpora
Publish At:2020-06-04 12:22 | Read:855 | Comments:0 | Tags:Data Protection Identity & Access Business Continuity C-Suit

Managed Data Activity Monitoring (DAM) Is More Important Than Ever

The transition to a remote workforce has happened so quickly that many security teams have not had an opportunity to apply desired controls. Organizations are dealing with remote access and execution privileges that were unplanned even a couple of months ago. The use of personal devices and home workspaces has increased potential risks. Typical controls such
Publish At:2020-06-03 09:20 | Read:889 | Comments:0 | Tags:Data Protection Risk Management Security Services Compliance

Video Conferencing Security for Businesses Isn’t a New Issue, It Just Came Into Focus

With 316 million Americans being asked to stay at home during the COVID-19 pandemic and nearly half of the U.S. population still working from home, video conferencing has suddenly become a critical tool for businesses. In fact, tools for remote work have spiked 84 percent since February, with video conferencing platforms like Webex recently sharing that they
Publish At:2020-06-01 07:09 | Read:1068 | Comments:0 | Tags:Threat Research remote workforce Access Management Authentic

How Chatbots Can Help Bridge Business Continuity and Cybersecurity

A quick web search for “chatbots and security” brings up results warning you about the security risks of using these virtual agents. Dig a little deeper, however, and you’ll find that this artificial intelligence (AI) technology could actually help address many work-from-home cybersecurity challenges — such as secure end-to-end encryption a
Publish At:2020-05-24 06:18 | Read:891 | Comments:0 | Tags:Artificial Intelligence Identity & Access Risk Management Ac

COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface

As organizations adapt and respond to the impact of COVID-19, significant new challenges are on the rise as a majority of the workforce has shifted to remote work arrangements. Employee-owned devices and home networks that were not formerly protected by enterprise security controls have rapidly expanded many organizations’ attack surfaces. At the same
Publish At:2020-04-17 13:00 | Read:1218 | Comments:0 | Tags:CISO Security Services Threat Hunting Threat Intelligence Co

Lock Down Personal Smart Devices to Improve Enterprise IoT Security

The presence of internet of things (IoT) devices in employee’s homes is a neglected item in many enterprise threat models. Caution is certainly warranted here, but it’s entirely possible to improve your risk awareness and secure smart devices in a calm and measured way. Overlooking privacy and security risks has consequences. It’s in everyo
Publish At:2020-04-09 10:28 | Read:1200 | Comments:0 | Tags:CISO Connected Devices Enterprise Security Home Network Secu

CamuBot Resurfaces With Cross-Channel, Targeted Attacks in Brazil

The malware discussed in this blog saw input from X-Force researchers Andre Piva and Ofir Ozer. It was initially described in a blog post by X-Force’s Maor Wiesen and Limor Kessem. The IBM Trusteer cybercrime research labs specialize in the detection and counteraction of the crimeware and attacks operated by organized cybercrime gangs. In one of our re
Publish At:2020-02-09 10:30 | Read:1037 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Malware Bankin

Analyze Attack Patterns to Make Your Environment Secure by Design

A great way to mitigate the effects of a cyber incident is to analyze attack patterns. This requires analysts to build a pattern up from a single security event, such as a command execution or malicious file download, into a collection of data that can help them trace and defend against an attack. To accomplish this level of analysis, security professionals
Publish At:2017-09-01 10:00 | Read:3558 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Cognitive Securi


Tag Cloud