Here in Hackercombat.com, we recently reported about IBM’s security study about financial cost due to breaches are getting expensive. A similar study, this time by Accenture with partnership with Ponemon…
Read MoreHere in Hackercombat.com, we recently reported about IBM’s security study about financial cost due to breaches are getting expensive. A similar study, this time by Accenture with partnership with Ponemon…
Read MoreEveryday, we feature here in Hackercombat.com stories of failures of various organizations. One way or another, these companies may deny that they are fully responsible for the hacking incidents, but…
Read MoreIn May 2018, the General Data Protection Regulation (GDPR) was enforced by the European Union (EU) to protect its citizens from the misuse of their personal data. This breakthrough regulation…
Read MoreA data breach that hit the Desjardins Group has affected around 2.7 million people. Reports say that more than 40 percent of clients and members of the Quebec-based credit union…
Read MoreWhen it comes to data protection acts, the Gramm-Leach-Bliley Act is one of the more important ones to understand. Also known as the Financial Modernization Act of 1999, it is…
Read MoreHIPAA Definition The Health Insurance Portability and Accountability Act (HIPAA) is a bill that was signed by then-President Bill Clinton in 1996. One of this act’s main goals is to…
Read MoreHaving the Google search engine is a blessing for many people who are searching for answers to whatever questions they may have. However, for the telecommunication conglomerate TalkTalk, having Google…
Read MoreAny time you go online, you open yourself up to the risk of being hacked. Whilst this is a rather unpleasant truth, it’s one we must recognize regardless in order…
Read MoreHaving a good data leak prevention plan is a must for all organizations today. In today’s world, when companies rely on all kinds of new emerging technologies for carrying out…
Read MoreA data-centric approach to data security is based on the information that needs protection instead of the network, application or device. Traditional network, device or application-based solutions only protected information…
Read More