Author Details

A Simple Look At An Efficient Enterprise MDR

In general, corporate security policies define the information assets needed to continue corporate activities. Detecting threats to this information...

Read More
pen3

Wireless LAN access points (hereinafter referred to as wireless APs) are highly convenient and are being installed for internal...

Read More
Defining a Data Protection Officer DPO

When the General Data Protection Regulation, or GDPR, was released, it led to the creation of a new role...

Read More
Definition and Importance of an Information Security Analyst

The information security analyst is an important role in any organization, since they keep sensitive information secure. They work...

Read More
Singapore 1

These days, hackers are not after 15 minutes to a day of fame with their actions, they are fully...

Read More
Threats and Security Solutions for IIoT

Industrial IoT (IIoT) provides greater connectivity to industries in all sectors, generating valuable information about operations. By using this...

Read More
OSXLinker Malware A Weaponized Unpatched Security Bug

We rarely feature a story about MacOS security here in Hackercombat.com, as the platform is not really attractive for...

Read More
Second US City Pays Hackers For Ransomware

A city in Florida paid $ 500,000 to the hackers after a ransomware attack. The total amount the city...

Read More
Device Control Measures Should You Really Do It

Today, removable devices like flash drives and external hard drives help make data transport much easier. Large amounts of...

Read More
Snapdragon 855 Marriage of Sim Card Mobile Soc

Smart Card technology in a mobile SOC (System-On-a-Chip)? This is the newest innovation that Qualcomm, a mainstream ARM SOC...

Read More

Page 7 of 96

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register