BreachDirectory3 Ways to Improve the Security of Your Web ApplicationIn this blog, we will walk you through the most popular ways to improve the security of your web application.3 min read·Jan 10, 2023----
BreachDirectoryCyber Liability vs. Data BreachIn this blog, we walk you through the key similarities and differences between cyber liability and a data breach.4 min read·Jan 10, 2023----
BreachDirectoryWhat Can Be Done with an Email Address? A Cybercriminal PerspectiveEmail adresses are one of the most commonly stolen data classes in data breaches — why? what damage can be done? Figure out here.5 min read·Jan 5, 2023----
BreachDirectoryWeb Application Security Headers ExplainedWeb application security headers. Some may not be aware of what they do — learn everything about them here.5 min read·Jan 5, 2023----
BreachDirectoryWhere Do Data Breaches Originate From? Top 10 CountriesIn this blog, we’re walking you through the top 10 countries that data breaches originate from. We have some interesting news to share!5 min read·Jan 3, 2023----
BreachDirectoryWhich Team Is Responsible for Debriefing After a Cyber Attack?In this blog, we tell you about the teams in a technology-based company that are involved in debriefing after an incident has occurred.6 min read·Jan 3, 2023----
BreachDirectoryDoes a VPN Make You Anonymous?Do VPN services make their users 100% anonymous? Join us as we answer that question!3 min read·Dec 27, 2022----
BreachDirectoryWhat Is a Data Leak?In this blog, we explain data leaks and walk you through the similarities and differences between data leaks and data breaches. Have a read!6 min read·Dec 22, 2022----
BreachDirectoryStaying Cyber Safe on ChristmasIn this blog, we’re going to walk you through what can you do to stay safe when Christmas shopping online.6 min read·Dec 22, 2022----
BreachDirectoryHow to Prepare For a Cyber Attack?In this blog, we walk you through the things you should consider to be adequately prepared for a cyber attack. Have a read!5 min read·Dec 5, 2022----