Information Security
Fernet makes it easy for Python developers to implement encryption and authentication into their applications.
By Josh Lake in Information Security on June 15, 2022
Server-side include (SSI) injection attacks aren't the most common online attack, but they can have disasterous consequences. This post looks at what SSI injection attacks are and provides tips on defending against them.
By Marc Dahan in Information Security on June 14, 2022
The CIA triad are three critical attributes for data security; confidentiality, integrity and availability.
By Josh Lake in Information Security on June 14, 2022
Single sign-on can make life easier for users and help to boost an organization's overall security. We reveal the pros and cons of single sign-on and whether you should use it.
By Josh Lake in Information Security on June 14, 2022
If a preimage attack is possible against the cryptographic hash functions we use, it could completely undermine our online security.
By Josh Lake in Information Security on June 14, 2022
Websites and apps use dark patterns to manipulate us into taking actions that we may not want to take. Find out how they violate our privacy.
By Josh Lake in Information Security on June 14, 2022
There’s no denying COVID changed the way we work. But did it have an impact on the number of cybersecurity threats during the pandemic? Take a look at the latest facts and statistics to find out.
By Aimee O'Driscoll in Information Security on August 11, 2022
Cyber crime is rife across the globe. We reveal the impact in Italy by rounding up the latest cyber security and cyber crime statistics in the country.
By Aimee O'Driscoll in Information Security on July 22, 2022
Page 2 of 39
© 2022 Comparitech Limited. All rights reserved.
Comparitech.com is owned and operated by Comparitech Limited, a registered company in England and Wales (Company No. 09962280), Suite 3 Falcon Court Business Centre, College Road, Maidstone, Kent, ME15 6TF, United Kingdom. Telephone +44(0)333 577 0163