Matches a date in the format dd/mm/yyyy , dd-mm-yyyy or dd.mm.yyyy &…
Control of regulated networks and life hacks and monitoring of web addresses…
You can use these commands and rules to search for exploitation attempts…
Electronic mail (email or e-mail) is a method of exchanging messages (“mail”) between people using…
Regular expressions and life hacks to control the prevention and monitoring of…
Introduction The microservice architecture is being increasingly used for designing and implementing…
Checklist of the most important security countermeasures when designing, testing, and releasing…
Introduction REST (or REpresentational State Transfer) is an architectural style first described in Roy Fielding‘s Ph.D. dissertation…
Control and prevent leakage of IBAN (International Bank Account Number) through DLP solution.…
Control and prevent leakage of Ukrainian identification number through DLP solution. Identification…
Control and prevention of Ukrainian passport leakage through DLP solution. The information…