Security

The API Security Checklist

In this blog, we walk you through everything you need to know about APIs from the security perspective.

2 years ago

Staying Safe In a Work From Home Environment: A Guide

This blog will act as a guide teaching you how to safely work remotely from home. Have a read!

2 years ago

How Secure is Slack?

In this blog, we answer a popular question for those working from home - is Slack safe to use?

2 years ago

What Not to Do After a Data Breach?

In this blog, we explain what you should avoid doing after the company you work at suffers a data breach.…

2 years ago

Discord Data Leak – Did the Service Suffer a Data Breach?

In this blog, we dig into the rumors surrounding Discord - did the Discord data breach really happen?

2 years ago

Web Application Security Solutions: Problems Solved, Examples, and Differences

In this blog, we walk you through various problems solved by web application security solutions. Have a read!

2 years ago

Chrome Has Found Your Password In a Data Breach. What Now?

In this blog, we walk you through your options once you've been made aware that Chrome has found your password…

2 years ago

What Is Password Hashing? Password Hashing Explained

In this blog, we walk you through password hashing - you'll learn what it is, how it works, and what…

2 years ago

CCPA (CPRA) Is Coming – What’s On the Radar?

In this blog, we explain the Californian GDPR - the CCPA. We tell you what it is, how it works,…

2 years ago

How to Prevent a Data Leak?

In this blog, we walk you through the steps necessary to prevent a data leak in your organization.

2 years ago