data breach

MyISAM vs. InnoDB: The Problem

In this blog post, we tell you how does MyISAM compare with InnoDB.

2 years ago

How to Protect Against CSRF?

In this blog post, we tell you how best to protect your web applications against CSRF attacks.

2 years ago

The TikTok & weChat Data Breaches: What’s Known?

In this blog, we walk you through the TikTok and weChat data breaches in more detail - join us to…

2 years ago

The Twitter Data Breach: What’s Known?

In this blog, we take a deeper look into the recent Twitter data breach. Read on to learn all about…

2 years ago

The T-Mobile Data Breach: Lessons Learned

In this blog, we take a deeper look into the T-Mobile data breach that is said to be one of…

2 years ago

The Requirements for a Web Application Firewall: What’s On the List?

In this blog, we go through some of the requirements that can make or break a web application firewall.

2 years ago