security

The MySQL Server – mysqld

In this blog, we discuss the ins and outs of the MySQL daemon and tell you how best to improve…

2 years ago

The Twitter Data Breach: What’s Known?

In this blog, we take a deeper look into the recent Twitter data breach. Read on to learn all about…

2 years ago

The T-Mobile Data Breach: Lessons Learned

In this blog, we take a deeper look into the T-Mobile data breach that is said to be one of…

2 years ago

The Requirements for a Web Application Firewall: What’s On the List?

In this blog, we go through some of the requirements that can make or break a web application firewall.

2 years ago

The Defense in Depth Principle Explained: the Meaning and Approach

In this blog, we discuss the defense in depth principle and its related information security practices.

2 years ago

The OWASP Top 10 Principles: What Should You Keep in Mind?

In this blog, we cover the principles of OWASP Top 10 and compare the editions of OWASP. Read the blog…

2 years ago

Secure File Upload in PHP: A Guide

In this blog, we explore ways to build a secure file upload script using PHP.

2 years ago

WAF vs. IPS – What’s the Difference?

In this blog, we figure out the main differences between a WAF and an IPS.

2 years ago

MySQL Security Best Practices: A Checklist

MySQL Security Best Practices: A Checklist In an ever-changing technology landscape, it is critical for companies and individuals to know…

2 years ago