security

The Importance of APIs In the Information Security Industry: A Walkthrough

In this blog, we walk you through what API solutions can do to safeguard your data. Have a read!

2 years ago

Chrome Has Found Your Password In a Data Breach. What Now?

In this blog, we walk you through your options once you've been made aware that Chrome has found your password…

2 years ago

Composite Indexes in Databases: What are They?

In this blog, we tell you it all about composite indexes - what they are, how they work, and when…

2 years ago

The Data Breach Investigation and Mitigation Checklist

In this blog, we provide you with the data breach investigation and mitigation checklist necessary to avoid mishaps when dealing…

2 years ago

Protecting Applications From RCE with a Single Function: a Cheat Sheet

In this blog post, we provide you with a cheat sheet to quickly protect your web applications from Remote Code…

2 years ago

What is SSRF?

In this blog post, we tell you what SSRF is, how it works, and how best to protect against the…

2 years ago

The TikTok & weChat Data Breaches: What’s Known?

In this blog, we walk you through the TikTok and weChat data breaches in more detail - join us to…

2 years ago

How to Protect Yourself From Phishing Attacks?

In this blog post, we tell you how best to protect yourself from phishing attacks and walk you through a…

2 years ago

Choosing Character Sets in MySQL: A Short Guide

In this blog, we will look a little closer into the character sets available in MySQL – we will tell…

2 years ago