BreachDirectory

Web Application Security Solutions: Problems Solved, Examples, and Differences

In this blog, we walk you through various problems solved by web application security solutions. Have a read!

2 years ago

Chrome Has Found Your Password In a Data Breach. What Now?

In this blog, we walk you through your options once you've been made aware that Chrome has found your password…

2 years ago

An Enterprise Edition of The BreachDirectory API Is Now Available!

This blog will walk you through the Enterprise edition of the BreachDirectory API.

2 years ago

What Is Password Hashing? Password Hashing Explained

In this blog, we walk you through password hashing - you'll learn what it is, how it works, and what…

2 years ago

CCPA (CPRA) Is Coming – What’s On the Radar?

In this blog, we explain the Californian GDPR - the CCPA. We tell you what it is, how it works,…

2 years ago

How to Prevent a Data Leak?

In this blog, we walk you through the steps necessary to prevent a data leak in your organization.

2 years ago

“This Password Has Appeared In a Data Leak.” What Now?

In this blog, we walk you through your options once you're aware that you're at risk of identity theft.

2 years ago

What Makes a Good Data Breach Checker?

In this blog, we discuss what makes or breaks a data breach search engine.

2 years ago

APIs: What Are They, How They Work, and Where Should They Be Used?

In this blog, we explain the importance of API services: we tell you what they are, how they work, and…

2 years ago