Blockchain-based VPNs: The Next Step in Privacy Tech?

Could open source bandwidth utilized by blockchain be the alternative to today’s VPN? Every person who goes online today fights a losing privacy battle. Every site we visit, every app we download, every service we subscribe to collects our perso… Continue reading Blockchain-based VPNs: The Next Step in Privacy Tech?

Is Your Web Host Taking Cybersecurity Seriously?

If you’ve read our article on website security tips, and taken all the necessary steps to secure your new website before it goes live, well done. You are clearly taking your own security seriously. Unfortunately, the same cannot be said for many web h… Continue reading Is Your Web Host Taking Cybersecurity Seriously?

Does Your Organization ‘Get’ Chaos Engineering?

Chaos engineering aims to prevent security issues and outages before they happen. So why aren’t more organizations using it? In many ways, the cloud computing movement has simplified technology infrastructure for organizations across the globe. … Continue reading Does Your Organization ‘Get’ Chaos Engineering?

Is Your Smartphone App at Risk of Infecting Users?

The time to bring in security during the application development process should not be right before launch We live in a world of threats. They’re all around us in the real world, in the air and in cyberspace. What can we do when measures we put … Continue reading Is Your Smartphone App at Risk of Infecting Users?

How To Protect Your Website Against A Cross-Site Scripting (XSS) Attack

One of the most common methods that hackers use/will use to attack your website is a cross-site scripting (XSS) attack. Basically, an XSS attack is where a hacker will take advantage of an XSS vulnerability to execute a malicious JavaScript when users … Continue reading How To Protect Your Website Against A Cross-Site Scripting (XSS) Attack