What Is a Hacker?

2 years ago

In this blog post, we dig into the world of hackers and answer the age old question - what is…

DDoS Attacks: Common Types and Protection Methods

2 years ago

In this blog, we walk you through the common types of DDoS attacks and ways to protect against them.

The Importance of APIs In the Information Security Industry: A Walkthrough

2 years ago

In this blog, we walk you through what API solutions can do to safeguard your data. Have a read!

The API Security Checklist

2 years ago

In this blog, we walk you through everything you need to know about APIs from the security perspective.

Staying Safe In a Work From Home Environment: A Guide

2 years ago

This blog will act as a guide teaching you how to safely work remotely from home. Have a read!

How Secure is Slack?

2 years ago

In this blog, we answer a popular question for those working from home - is Slack safe to use?

What Not to Do After a Data Breach?

2 years ago

In this blog, we explain what you should avoid doing after the company you work at suffers a data breach.…

Discord Data Leak – Did the Service Suffer a Data Breach?

2 years ago

In this blog, we dig into the rumors surrounding Discord - did the Discord data breach really happen?

Web Application Security Solutions: Problems Solved, Examples, and Differences

2 years ago

In this blog, we walk you through various problems solved by web application security solutions. Have a read!

Chrome Has Found Your Password In a Data Breach. What Now?

2 years ago

In this blog, we walk you through your options once you've been made aware that Chrome has found your password…