Cybersecurity Protection Needs To Reach The Next Level

Cybersecurity Protection Needs To Reach The Next Level

Here in Hackercombat.com, we recently reported about IBM’s security study about financial cost due to breaches are getting expensive. A similar study, this time by Accenture with partnership with Ponemon…

Read More
Everyday Mistakes In A Firm That Promotes IT Risks

Everyday Mistakes In A Firm That Promotes IT Risks

Everyday, we feature here in Hackercombat.com stories of failures of various organizations. One way or another, these companies may deny that they are fully responsible for the hacking incidents, but…

Read More
Open EDR
5 Important GDPR Requirements

Privacy Act: 5 Important GDPR Requirements to Remember

In May 2018, the General Data Protection Regulation (GDPR) was enforced by the European Union (EU) to protect its citizens from the misuse of their personal data. This breakthrough regulation…

Read More
Data Breach Hits Desjardins 2.7 Million People Affected

Data Breach Hits Desjardins, 2.7 Million People Affected

A data breach that hit the Desjardins Group has affected around 2.7 million people. Reports say that more than 40 percent of clients and members of the Quebec-based credit union…

Read More
Understand the Gramm Leach Bliley Act

Understand the Gramm-Leach-Bliley Act

When it comes to data protection acts, the Gramm-Leach-Bliley Act is one of the more important ones to understand. Also known as the Financial Modernization Act of 1999, it is…

Read More
What is HIPAA Compliance

What is HIPAA Compliance?

HIPAA Definition The Health Insurance Portability and Accountability Act (HIPAA) is a bill that was signed by then-President Bill Clinton in 1996. One of this act’s main goals is to…

Read More
TalkTalk’s Databreach Made Secret Exposed In A Google Search 1

TalkTalk’s Databreach Made Secret, Exposed In A Google Search

Having the Google search engine is a blessing for many people who are searching for answers to whatever questions they may have. However, for the telecommunication conglomerate TalkTalk, having Google…

Read More
How to Protect Your Personal Information Online

How to Protect Your Personal Information Online

Any time you go online, you open yourself up to the risk of being hacked. Whilst this is a rather unpleasant truth, it’s one we must recognize regardless in order…

Read More
Reasons Why Your Organization Needs Data Loss Prevention Policy

Reasons Why Your Organization Needs Data Loss Prevention Policy?

Having a good data leak prevention plan is a must for all organizations today. In today’s world, when companies rely on all kinds of new emerging technologies for carrying out…

Read More
Key Factors for Data Centric Data Protection 1

Key Factors for Data – Centric Data Protection

A data-centric approach to data security is based on the information that needs protection instead of the network, application or device. Traditional network, device or application-based solutions only protected information…

Read More

Page 2 of 8

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register