data breach scanner

Which Team Is Responsible for Debriefing After a Cyber Attack?

Which team is responsible for debriefing after a cyber attack? Find out here.

1 year ago

3 Ways to Improve the Security of Your Web Application

There are many ways to improve the security of our web applications. In this blog, we provide you with some…

1 year ago

Web Application Security Headers Explained

In this blog, we walk you through the basics and possible implications of using HTTP security headers. Have a read!

1 year ago

Where Do Data Breaches Originate From? Top 10 Countries

In this blog, we’re walking you through the top 10 countries that data breaches originate from. We have some interesting…

2 years ago

Does a VPN Make You Anonymous?

Do VPN services make their users 100% anonymous? Join us as we answer that question!

2 years ago

Data Breaches In the News

In this blog, we walk you through what impact can the media have on data breaches. Have a read.

2 years ago

Steam Account Hacked? Here’s What to Do!

In this blog, we walk you through the things you need to do once you find out that your Steam…

2 years ago

Alternatives to YouTube & TikTok

In this blog, we walk you through a bunch of alternatives to YouTube & TikTok. Have a read!

2 years ago

Salaries within the Information Security Sector: What, Why, How?

In this blog, we walk you through the salary information pertaining to information security experts. Have a read!

2 years ago