It is important to remember that implementing incident response steps is a process and not an isolated event. For a truly successful incident response, the team should have a coordinated…
Read MoreIt is important to remember that implementing incident response steps is a process and not an isolated event. For a truly successful incident response, the team should have a coordinated…
Read MoreThere are six security issues related to using cloud based management tools that organizations need to be aware of in order to protect their data. With the rise of cloud…
Read MoreIt is said by many regular folks in the Internet, “If you are not in Google, you don’t exist.” Though this may have resemblance of being factual, as the majority…
Read MoreWe rarely feature a story about MacOS security here in Hackercombat.com, as the platform is not really attractive for hackers to target. MacOS with its BSD underpinnings and minority market…
Read MoreWhat Is Application Control Systems? In today’s business environment, applications play a huge role in day-to-day business operations. With the help of applications, business processes are easier and less complicated,…
Read MoreToday, removable devices like flash drives and external hard drives help make data transport much easier. Large amounts of corporate data can easily be transferred from one branch office to…
Read MoreThe National Institute of Standards and Technology, or NIST, is a government agency (non-regulatory) that develops metrics, standards, and technologies that aim to drive both innovation and the economic competitiveness…
Read MoreGiving out your email address or phone number when signing in for an online service could land you in trouble. You might end up being a victim of a SIM…
Read MoreWhen it comes to data protection acts, the Gramm-Leach-Bliley Act is one of the more important ones to understand. Also known as the Financial Modernization Act of 1999, it is…
Read MoreTwo thousand unauthorized access attempts in 48-hours, that is how New Zealand’s Treasury Secretary in coordination with the National Cyber Security Centre described the budget information record hacking incident that…
Read More