The Requirements for a Web Application Firewall: What’s On the List?

2 years ago

In this blog, we go through some of the requirements that can make or break a web application firewall.

The Defense in Depth Principle Explained: the Meaning and Approach

2 years ago

In this blog, we discuss the defense in depth principle and its related information security practices.

The OWASP Top 10 Principles: What Should You Keep in Mind?

2 years ago

In this blog, we cover the principles of OWASP Top 10 and compare the editions of OWASP. Read the blog…

Secure File Upload in PHP: A Guide

2 years ago

In this blog, we explore ways to build a secure file upload script using PHP.

WAF vs. IPS – What’s the Difference?

2 years ago

In this blog, we figure out the main differences between a WAF and an IPS.

MySQL Security Best Practices: A Checklist

2 years ago

MySQL Security Best Practices: A Checklist In an ever-changing technology landscape, it is critical for companies and individuals to know…

Data Breaches: What’s on the Radar for 2022?

3 years ago

As we all see, data breaches are, unfortunately, still with us and it’s unlikely that they’re going away any time…

Password Security Level: Generated

3 years ago

If you are a developer that is passionate about security or even a security expert, chances are that you know…

Šredingerio Paradoksas MySQL

4 years ago

Jei kada nors gilinotės į fiziką ir ypač į kvantinę mechaniką, tikriausiai girdėjote apie keistą reiškinį pavadintą Šredingerio paradoksu arba…

Schrödinger’s Paradox in MySQL

4 years ago

If you have ever dived deeper into physics and quantum mechanics in particular, you have probably heard of this weird…