The AT&T Data Breach: Here’s What We Know

6 months ago

Did the AT&T data breach happen? What data classes did it expose and what can you do to protect yourself?…

PostgreSQL vs MySQL: A Comparison

6 months ago

In this PostgreSQL vs MySQL blog, we walk you through when to choose PostgreSQL or MySQL for your use case.

An Intro to Secure Internal Communication

7 months ago

In this blog, we walk you through secure internal communication tools and tell you what they're used for.

The Basics of Securing an Application

7 months ago

In the wake of recent news, knowledge of securing both your database and your application is more and more beneficial.…

The MongoDB Security Incident: What’s Known

7 months ago

During December 2023, a new data breach – a MongoDB security incident – emerged. What Happened? According to HackRead, MongoDB’s…

What Can Be Done with an Email Address? Cybercriminal Perspective

1 year ago

Email addresses are amongst the most frequently stolen pieces of information in data breaches. What can be done with them?…

Cyber Liability vs. Data Breach

2 years ago

In this blog, we walk you through the key similarities and differences between cyber liability and a data breach.

Which Team Is Responsible for Debriefing After a Cyber Attack?

2 years ago

Which team is responsible for debriefing after a cyber attack? Find out here.

3 Ways to Improve the Security of Your Web Application

2 years ago

There are many ways to improve the security of our web applications. In this blog, we provide you with some…

Web Application Security Headers Explained

2 years ago

In this blog, we walk you through the basics and possible implications of using HTTP security headers. Have a read!