data breach checker

What Is a Hacker?

In this blog post, we dig into the world of hackers and answer the age old question - what is…

2 years ago

DDoS Attacks: Common Types and Protection Methods

In this blog, we walk you through the common types of DDoS attacks and ways to protect against them.

2 years ago

The Importance of APIs In the Information Security Industry: A Walkthrough

In this blog, we walk you through what API solutions can do to safeguard your data. Have a read!

2 years ago

The API Security Checklist

In this blog, we walk you through everything you need to know about APIs from the security perspective.

2 years ago

How Secure is Slack?

In this blog, we answer a popular question for those working from home - is Slack safe to use?

2 years ago

What Not to Do After a Data Breach?

In this blog, we explain what you should avoid doing after the company you work at suffers a data breach.…

2 years ago

Discord Data Leak – Did the Service Suffer a Data Breach?

In this blog, we dig into the rumors surrounding Discord - did the Discord data breach really happen?

2 years ago

Web Application Security Solutions: Problems Solved, Examples, and Differences

In this blog, we walk you through various problems solved by web application security solutions. Have a read!

2 years ago

Chrome Has Found Your Password In a Data Breach. What Now?

In this blog, we walk you through your options once you've been made aware that Chrome has found your password…

2 years ago