A term used by Gartner, DCAP means Data-Centric Audit and Protection. The main goal of DCAP Gartner is to protect the data...
In the world of digital technology, almost everything is on the internet, including your personal data. If this falls into the wrong...
Bitcoin has been in existence for more than a decade now, and its rise to popularity (or unpopularity, depending on who you...
As the cloud-service industry’s competition heats up, Google is enhancing its current web services with Advanced Protection, a new way for the...
Your data is a big part of your company. There are a hundred ways to immediately lose all of them and that...
A data breach that hit the Desjardins Group has affected around 2.7 million people. Reports say that more than 40 percent of...
In May 2018, the General Data Protection Regulation (GDPR) was enforced by the European Union (EU) to protect its citizens from the...
HIPAA Definition The Health Insurance Portability and Accountability Act (HIPAA) is a bill that was signed by then-President Bill Clinton in 1996....
First American Financial Corp, a U.S based financial services company leaked Hundreds of Million of Most sensitive records online that related to...
As mobile banking and online banking services grow, the threat actors’ interest in exploiting these platforms is also spreading. According to experts...
Having the Google search engine is a blessing for many people who are searching for answers to whatever questions they may have....
The recent compromise of Facebook privacy has caused ripples of fear as to whether any data can be safe. Yes. You can...
Any time you go online, you open yourself up to the risk of being hacked. Whilst this is a rather unpleasant truth,...
Having a good data leak prevention plan is a must for all organizations today. In today’s world, when companies rely on all...
Researchers discovered the 150GB volume of biggest and most comprehensive email unprotected MongoDB that leaked 800 Million Email data online that belongs...
A data-centric approach to data security is based on the information that needs protection instead of the network, application or device. Traditional...
Last Dec 22, 2018, we have reported here in Hackercombat.com the nastly leak of the European Union COREU network that contains diplomatic...
If you are using passwords in multiple Web services etc., if that one-and-only password gets leaked, your entire Internet identity and access...
California proposed legislation if passed, would set stricter guidelines for when companies need to inform customers of a data breach. Attorney General...
After 18 months of an investigation against Facebook, probing the social media platform’s privacy practice, the UK government has published a detailed...
Amazon’s Cloud offering provides reasonable security tools in order to prevent technical infiltration from outside attempts. However, breaches due to unknown bugs,...