In this blog, we walk you through how attackers assess the price of your social media accounts and answer the question whether you could be a target. Join in!
Read moreAn Enterprise Edition of The BreachDirectory API Is Now Available!
This blog will walk you through the Enterprise edition of the BreachDirectory API.
Read moreCCPA (CPRA) Is Coming – What’s On the Radar?
In this blog, we explain the Californian GDPR – the CCPA. We tell you what it is, how it works, and should you be worried.
Read moreHow to Prevent a Data Leak?
In this blog, we walk you through the steps necessary to prevent a data leak in your organization.
Read moreWhat Makes a Good Data Breach Checker?
In this blog, we discuss what makes or breaks a data breach search engine.
Read moreAPIs: What Are They, How They Work, and Where Should They Be Used?
In this blog, we explain the importance of API services: we tell you what they are, how they work, and where should they be used.
Read moreThe T-Mobile Data Breach: Lessons Learned
In this blog, we take a deeper look into the T-Mobile data breach that is said to be one of the most shocking breaches of such kind.
Read more