Privacy

Black Hat USA 2024, DEFCON 2024, and Mandatory Hotel Room Checks

This blog covers the recent Black Hat USA 2024 (DEFCON 2024) conference and digs into privacy concerns involving hotel room…

2 weeks ago

Denmark to Ban Encrypted Telegram, Signal Messengers

In this blog, we’re exploring the reasons why Denmark may ban end to end encryption messenger software like Signal, Telegram,…

3 weeks ago

This Disney Hack May Be the Worst One Yet: Entire Slack Channel at Risk

One of the most prominent Disney hacks may have just occurred — find out what had happened in this blog.

2 months ago

An Intro to Secure Internal Communication

In this blog, we walk you through secure internal communication tools and tell you what they're used for.

3 months ago

What Can Be Done with an Email Address? Cybercriminal Perspective

Email addresses are amongst the most frequently stolen pieces of information in data breaches. What can be done with them?…

1 year ago

Cyber Liability vs. Data Breach

In this blog, we walk you through the key similarities and differences between cyber liability and a data breach.

1 year ago

Which Team Is Responsible for Debriefing After a Cyber Attack?

Which team is responsible for debriefing after a cyber attack? Find out here.

1 year ago

3 Ways to Improve the Security of Your Web Application

There are many ways to improve the security of our web applications. In this blog, we provide you with some…

1 year ago

Web Application Security Headers Explained

In this blog, we walk you through the basics and possible implications of using HTTP security headers. Have a read!

1 year ago