The TikTok & weChat Data Breaches: What’s Known?

2 years ago

In this blog, we walk you through the TikTok and weChat data breaches in more detail - join us to…

Protecting Web Applications from Remote Code Execution (RCE): a Short Guide

2 years ago

In this blog, we explain how best to protect your web applications from Remote Code Execution attacks.

How to Protect Yourself From Phishing Attacks?

2 years ago

In this blog post, we tell you how best to protect yourself from phishing attacks and walk you through a…

Choosing Character Sets in MySQL: A Short Guide

2 years ago

In this blog, we will look a little closer into the character sets available in MySQL – we will tell…

The MySQL Server – mysqld

2 years ago

In this blog, we discuss the ins and outs of the MySQL daemon and tell you how best to improve…

The Twitter Data Breach: What’s Known?

2 years ago

In this blog, we take a deeper look into the recent Twitter data breach. Read on to learn all about…

The T-Mobile Data Breach: Lessons Learned

2 years ago

In this blog, we take a deeper look into the T-Mobile data breach that is said to be one of…

The Requirements for a Web Application Firewall: What’s On the List?

2 years ago

In this blog, we go through some of the requirements that can make or break a web application firewall.

The Defense in Depth Principle Explained: the Meaning and Approach

2 years ago

In this blog, we discuss the defense in depth principle and its related information security practices.

The OWASP Top 10 Principles: What Should You Keep in Mind?

2 years ago

In this blog, we cover the principles of OWASP Top 10 and compare the editions of OWASP. Read the blog…