From 1.2 million to 10 million Dixons Carphone Admitted a Bigger Data Breach

From 1.2M to 10M, Dixons Carphone Admitted a Bigger Data Breach

In a public press release, Dixons Carphone, a mainstream European electrical and telecom retailer/services firm, announced that it became a victim of a security breach way back in 2017, the…

Read More
4 Actions that Firms need to do at the wake of a Data Breach

Data Breach? Don’t Panic—Just Remember These 4 Tips

In show business, even bad publicity is still publicity, so celebrities could generally care less about it. After all, visibility is the lifeblood of an actor or singer or sports…

Read More
Open EDR
How GDPR affects Reddit

How GDPR affects Reddit?

EU’s GDPR or the General Data Protection Regulation has a huge influence on how global companies operate on the Internet today. It finally took effect on May 25, 2018, firms…

Read More
Hackercombat GDPR Special Security Tips for Agents

Here’s Your HackerCombat GDPR Special: Security Tips For Agents

GDPR is finally here, and it’s time to start discussing how its various legal aspects will affect data security in the wake of the new regulations. Let’s begin with a…

Read More
Two Factor Authentication made mandatory by EU SCA 1

The EU Knows How To Make Two-Factor Authentication Mandatory

The European Parliament has done it again. Through the establishment of the Strong Customer Authentication (SCA),they have demanded companies prioritized the welfare of consumers. Hot on the heels of the recently…

Read More
Things to Consider When Defending Against Malware

Things to Consider When Defending Against Malware

“Failing to plan is planning to fail” – Benjamin Franklin In the world of IT, Franklin’s famous quote above still rings the bell. Sadly, there are still companies that are…

Read More
GDPR Non Compliance Is Not An Option

GDPR: Non-Compliance Is Not An Option

Visit any reputable website today, and you may encounter a pop-up similar to the sample below: This is not a coincidence, as it is mandated by EU General Data Protection…

Read More
Fundamentals of Computing Security in the World of Modern Malware and Threats

Fundamentals Of Computing Security

Because the transfer of data used to function through the Sneakernet, personal computing in the 80’s and 90’s was a lot more simple. The slang term refers to the method users must adopt,…

Read More
The General Data Protection Regulation’s role in the Age of Big Data

How Will The GDPR Survive In The Jungle of Big Data?

We are living in the age of big data, in a world that now generates 2.5 quintillion bytes of data every day. For the mathematically inclined, that is roughly 2,684,354,270.08 gigabytes, a…

Read More
IBM’s Engaging Managed Services Enhanced by Commvault Technology

IBM’s Managed Services To Skyrocket Using Commvault Technology

The data management solutions provider, Commvault, has publicly announced a partnership with the technology giant, IBM, in providing a more compelling, unified platform for both on-site and cloud infrastructure covering…

Read More

Page 4 of 5

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register