The Five Incident Response Steps 1

The Five Incident Response Steps

It is important to remember that implementing incident response steps is a process and not an isolated event. For a truly successful incident response, the team should have a coordinated…

Read More
Security Issues Related to Using Cloud Based Management Tools

Security Issues Related to Using Cloud Based Management Tools

There are six security issues related to using cloud based management tools that organizations need to be aware of in order to protect their data. With the rise of cloud…

Read More
Open EDR
9 Alternative Search Engines Only Advanced Users Know

9 Alternative Search Engines Only Advanced Users Know

It is said by many regular folks in the Internet, “If you are not in Google, you don’t exist.” Though this may have resemblance of being factual, as the majority…

Read More
OSXLinker Malware A Weaponized Unpatched Security Bug

OSX/Linker Malware, A Weaponized Unpatched Security Bug

We rarely feature a story about MacOS security here in Hackercombat.com, as the platform is not really attractive for hackers to target. MacOS with its BSD underpinnings and minority market…

Read More
What Is Application Control — Types and Benefits

What Is Application Control? — Types and Benefits

What Is Application Control? In today’s business environment, applications play a huge role in day-to-day business operations. With the help of applications, business processes are easier and less complicated, especially…

Read More
Device Control Measures Should You Really Do It

Device Control Measures: Should You Really Do It?

Today, removable devices like flash drives and external hard drives help make data transport much easier. Large amounts of corporate data can easily be transferred from one branch office to…

Read More
WHAT IS NIST COMPLIANCE

Understanding What is NIST Compliance

The National Institute of Standards and Technology, or NIST, is a government agency (non-regulatory) that develops metrics, standards, and technologies that aim to drive both innovation and the economic competitiveness…

Read More
Generate Virtual Online IDs Prevent Attacks

Generate Virtual Online IDs, Prevent Attacks

Giving out your email address or phone number when signing in for an online service could land you in trouble. You might end up being a victim of a SIM…

Read More
Understand the Gramm Leach Bliley Act

Understand the Gramm-Leach-Bliley Act

When it comes to data protection acts, the Gramm-Leach-Bliley Act is one of the more important ones to understand. Also known as the Financial Modernization Act of 1999, it is…

Read More
New Zealand Opposition Behind Budget Info Hack 1

New Zealand Opposition Behind Budget Info Hack?

Two thousand unauthorized access attempts in 48-hours, that is how New Zealand’s Treasury Secretary in coordination with the National Cyber Security Centre described the budget information record hacking incident that…

Read More

Page 1 of 9

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register