BreachDirectory Blog
  • Search Engine
  • Features
  • API
  • Pricing
  • Documentation
  • Data Breaches
  • Blog
  • Contact

BreachDirectory Blog

Sponsor: CherryServers - Bare Metal Cloud for DevOps Engineers
Cyber Liability vs. Data Breach

Cyber Liability vs. Data Breach

January 10, 2023 Nirium Comments 0 Comment

In this blog, we walk you through the key similarities and differences between cyber liability and a data breach.

3 Ways to Improve the Security of Your Web Application

3 Ways to Improve the Security of Your Web Application

January 9, 2023 Nirium Comments 0 Comment

There are many ways to improve the security of our web applications. In this blog, we provide you with some of the most popular ones – have a read!

What Can Be Done with an Email Address? Cybercriminal Perspective

What Can Be Done with an Email Address? Cybercriminal Perspective

January 5, 2023 Nirium Comments 0 Comment

Email addresses are amongst the most frequently stolen pieces of information in data breaches. What can be done with them? Figure that out here.

Web Application Security Headers Explained

Web Application Security Headers Explained

January 5, 2023 Nirium Comments 0 Comment

In this blog, we walk you through the basics and possible implications of using HTTP security headers. Have a read!

Where Do Data Breaches Originate From? Top 10 Countries

Where Do Data Breaches Originate From? Top 10 Countries

January 3, 2023 Nirium Comments 0 Comment

In this blog, we’re walking you through the top 10 countries that data breaches originate from. We have some interesting stuff to share!

Which Team Is Responsible for Debriefing After a Cyber Attack?

Which Team Is Responsible for Debriefing After a Cyber Attack?

January 3, 2023 Nirium Comments 0 Comment

Which team is responsible for debriefing after a cyber attack? Find out here.

Does a VPN Make You Anonymous?

Does a VPN Make You Anonymous?

December 27, 2022 Nirium Comments 0 Comment

Do VPN services make their users 100% anonymous? Join us as we answer that question!

Staying Cyber Safe on Christmas

Staying Cyber Safe on Christmas

December 22, 2022 Nirium Comments 0 Comment

In this blog, we’re going to walk you through what can you do to stay safe when Christmas shopping online.

What Is a Data Leak? How Does It Differ From a Data Breach?

What Is a Data Leak? How Does It Differ From a Data Breach?

December 21, 2022 Nirium Comments 0 Comment

In this blog, we walk you through the similarities and differences between data leaks and data breaches. Have a read!

Data Breaches In the News

Data Breaches In the News

December 10, 2022 Nirium Comments 0 Comment

In this blog, we walk you through what impact can the media have on data breaches. Have a read.

Posts navigation

OLDER POSTS

Follow BreachDirectory

  • Facebook
  • LinkedIn
  • Twitter

Whitepapers

  • Whitepaper List

Recent Posts

  • Cyber Liability vs. Data Breach
  • 3 Ways to Improve the Security of Your Web Application
  • What Can Be Done with an Email Address? Cybercriminal Perspective
  • Web Application Security Headers Explained
  • Where Do Data Breaches Originate From? Top 10 Countries

Archives

  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • February 2022
  • September 2021
  • January 2021
  • November 2020
  • August 2020
  • July 2020
  • June 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020

Categories

  • Announcements
  • Data Breach Analysis
  • Data Breach Classifier
  • Database Performance
  • Security
© BreachDirectory, 2023 | This work is licensed under a Creative Commons Attribution 4.0 International License.