Learn about a SQL injection attack, its various types and harmful effects on businesses. Explore measures that can help mitigate these attacks.| Search Software Quality
PCI DSS is a set of security policies that protect credit and payment card data and transactions. Learn its requirements, benefits and challenges.| Search Security
Learn what the General Data Protection Regulation (GDPR) is, its purpose and what it protects. Examine several organizations that were fined for noncompliance.| WhatIs
PII is information that organizations should do their best to keep safe. Learn what PII is, how it's stolen, and some historical PII data breaches.| Search Security
Malware is malicious software that can cause damage to systems, devices and networks. Learn about the types of malware, how they work and how to detect and prevent them.| Search Security
Learn about compliance, the differences between regulatory and corporate compliance and roles within the compliance field, such as chief compliance officer.| Data Management
Learn about the principle of least privilege, how it works and how it's used. Examine its importance, the various types and how to implement it.| Search Security
Learn how and why a ransomware attack forced a major U.S. gas pipeline to temporarily shut down operations.| WhatIs
Learn what multifactor authentication is, how it works and the different methods. Examine its pros and cons and best practices for implementing MFA.| Search Security
Learn the purpose of the Health Insurance Portability and Accountability Act (HIPAA), how it effects health data and how businesses can comply with it.| Health IT and EHR