data breach

“This Password Has Appeared In a Data Leak.” What Now?

In this blog, we walk you through your options once you're aware that you're at risk of identity theft.

2 years ago

What Makes a Good Data Breach Checker?

In this blog, we discuss what makes or breaks a data breach search engine.

2 years ago

APIs: What Are They, How They Work, and Where Should They Be Used?

In this blog, we explain the importance of API services: we tell you what they are, how they work, and…

2 years ago

Composite Indexes in Databases: What are They?

In this blog, we tell you it all about composite indexes - what they are, how they work, and when…

2 years ago

The Data Breach Investigation and Mitigation Checklist

In this blog, we provide you with the data breach investigation and mitigation checklist necessary to avoid mishaps when dealing…

2 years ago

Protecting Applications From RCE with a Single Function: a Cheat Sheet

In this blog post, we provide you with a cheat sheet to quickly protect your web applications from Remote Code…

2 years ago

MyISAM vs. InnoDB: The Problem

In this blog post, we tell you how does MyISAM compare with InnoDB.

2 years ago

How to Protect Against CSRF?

In this blog post, we tell you how best to protect your web applications against CSRF attacks.

2 years ago

The TikTok & weChat Data Breaches: What’s Known?

In this blog, we walk you through the TikTok and weChat data breaches in more detail - join us to…

2 years ago