What Can Be Done with an Email Address? Cybercriminal Perspective

2 years ago

Email addresses are amongst the most frequently stolen pieces of information in data breaches. What can be done with them?…

Cyber Liability vs. Data Breach

2 years ago

In this blog, we walk you through the key similarities and differences between cyber liability and a data breach.

Which Team Is Responsible for Debriefing After a Cyber Attack?

2 years ago

Which team is responsible for debriefing after a cyber attack? Find out here.

3 Ways to Improve the Security of Your Web Application

2 years ago

There are many ways to improve the security of our web applications. In this blog, we provide you with some…

Web Application Security Headers Explained

2 years ago

In this blog, we walk you through the basics and possible implications of using HTTP security headers. Have a read!

Where Do Data Breaches Originate From? Top 10 Countries

2 years ago

In this blog, we’re walking you through the top 10 countries that data breaches originate from. We have some interesting…

Does a VPN Make You Anonymous?

2 years ago

Do VPN services make their users 100% anonymous? Join us as we answer that question!

Staying Cyber Safe on Christmas

2 years ago

In this blog, we're going to walk you through what can you do to stay safe when Christmas shopping online.

What Is a Data Leak? How Does It Differ From a Data Breach?

2 years ago

In this blog, we walk you through the similarities and differences between data leaks and data breaches. Have a read!

Data Breaches In the News

2 years ago

In this blog, we walk you through what impact can the media have on data breaches. Have a read.