What is Email Obfuscation?

Learn about why and how email addresses are obfuscated on websites.

Learn More

What is Web Application Firewall (WAF) and How is it Used to Protect Your Website?

WAFs -- their pros, cons and how they work.

Learn More

What is a Honeypot?

What "honeypot" servers are, how they're used and why they exist.

Learn More

What are Cross Site Scripting (XSS) attacks?

What XSS attacks are and how attacks take place.

Learn More

What Are Man In The Middle (MITM) Attacks?

What MITM attacks are, and why they're dangerous.

Learn More

What is CAPTCHA? How does it work and is it effective?

How CAPTCHA challenges are retrieved, processed, and some of their pros/cons.

Learn More

What is an SQL injection?

Learn about attacks against applications that uses an SQL databases.

Learn More

What are WAF (Web Application Firewall) Rules?

What they are and what do we use them for?

Learn More

What is BGP (Border Gateway Protocol) hijacking?

What is BGP hijacking?

Learn More

What is Single Sign-On (SSO) and what do we use it for?

Learn about Single Sign-On (SSO), what do we use it for and what are its advantages.

Learn More

What is Cybersecurity?

What is Cybersecurity?

Learn More