Web Application Security Solutions: Problems Solved, Examples, and Differences

3 years ago

In this blog, we walk you through various problems solved by web application security solutions. Have a read!

Chrome Has Found Your Password In a Data Breach. What Now?

3 years ago

In this blog, we walk you through your options once you've been made aware that Chrome has found your password…

An Enterprise Edition of The BreachDirectory API Is Now Available!

3 years ago

This blog will walk you through the Enterprise edition of the BreachDirectory API.

What Is Password Hashing? Password Hashing Explained

3 years ago

In this blog, we walk you through password hashing - you'll learn what it is, how it works, and what…

CCPA (CPRA) Is Coming – What’s On the Radar?

3 years ago

In this blog, we explain the Californian GDPR - the CCPA. We tell you what it is, how it works,…

How to Prevent a Data Leak?

3 years ago

In this blog, we walk you through the steps necessary to prevent a data leak in your organization.

“This Password Has Appeared In a Data Leak.” What Now?

3 years ago

In this blog, we walk you through your options once you're aware that you're at risk of identity theft.

What Makes a Good Data Breach Checker?

3 years ago

In this blog, we discuss what makes or breaks a data breach search engine.

APIs: What Are They, How They Work, and Where Should They Be Used?

3 years ago

In this blog, we explain the importance of API services: we tell you what they are, how they work, and…

Composite Indexes in Databases: What are They?

3 years ago

In this blog, we tell you it all about composite indexes - what they are, how they work, and when…