Security Knowledge Base

Cybersecurity Guides

Practical, in-depth articles on breach monitoring, email security, network hardening, and protecting your business — available in English and French.

EN FR
Breach Monitoring
How to Check If Your Email Was in a Data Breach (2026 Guide)
Step-by-step guide to find out if your email address appears in any known data breach — and what to do immediately if it does.
2026-03-01 · 6 min Read →
EN FR
Email Security
SPF, DKIM & DMARC Explained: Stop Email Spoofing in 2026
A complete, practical guide to SPF, DKIM, and DMARC — what they are, why they matter, and exactly how to configure them to prevent email spoofing.
2026-03-05 · 9 min Read →
EN FR
Web Security
HTTP Security Headers: Complete Setup Guide for Nginx, Apache & Cloudflare
Learn which HTTP security headers your website needs, why they matter, and how to configure them correctly on Nginx, Apache, and Cloudflare.
2026-03-08 · 10 min Read →
EN FR
Network Security
Port Scanning Guide: What Open Ports Mean for Your Security
Learn what port scanning is, which ports are dangerous to have open, and how to audit your own infrastructure before attackers do.
2026-03-10 · 8 min Read →
EN FR
SSL & Certificates
SSL/TLS Certificates: Everything You Need to Know in 2026
A complete guide to SSL/TLS certificates — what they are, how they work, the different types, common errors, and how to monitor expiry automatically.
2026-03-12 · 8 min Read →
EN FR
Account Security
Password Security in 2026: Best Practices You're Probably Not Following
Most people think they have good password hygiene. Most people are wrong. Here's what actually secure password management looks like.
2026-03-15 · 7 min Read →
EN FR
Business Security
Cybersecurity for Small Businesses: The Practical Guide for 2026
Small businesses are the #1 target for cyberattacks. This guide shows what actually matters and how to protect your business without a dedicated IT team.
2026-03-18 · 10 min Read →
EN FR
Vulnerability Management
What Is a CVE? A Practical Guide to Vulnerability Management
CVEs, CVSS scores, NVD, exploit databases — understanding the vulnerability management ecosystem helps you prioritize what to patch first.
2026-03-20 · 7 min Read →
EN FR
Web Security
Tech Stack Detection: What Your Website Reveals to Attackers
Every website leaks information about the technologies it uses. Attackers use this to find targeted vulnerabilities. Learn what your site exposes and how to minimize it.
2026-03-25 · 6 min Read →
EN FR
Network Security
Firewall Rules Setup Guide: UFW, iptables & AWS Security Groups
A practical guide to configuring firewall rules on Linux servers (UFW, iptables) and AWS Security Groups with ready-to-use configurations.
2026-03-28 · 9 min Read →
EN FR
Threat Intelligence
Dark Web Monitoring: What It Is and Do You Actually Need It?
Everyone sells 'dark web monitoring.' But what does it actually mean, what does it detect, and is it worth the cost?
2026-04-01 · 6 min Read →
EN FR
Incident Response
Incident Response: What to Do When You've Been Hacked
You've just discovered a security breach. What you do in the first 24 hours determines how bad the damage is. Here's a practical incident response checklist.
2026-04-05 · 8 min Read →
EN FR
Web Security
How to Secure Your WordPress Site in 2026: Complete Guide
WordPress is the #1 target for cyberattacks on the web. This practical guide covers all essential measures to secure your WordPress site.
2026-04-08 · 9 min Read →