My Work

Captain Compliance Blog

For free we provide a wealth of knowledge on all things compliance and data privacy. We believe in empowering companies and privacy focused people by creating educational content to help you understand and address privacy, compliance and consent questions that you may have. You can reach out to one of our compliance experts with any questions you may have or inquire about our data privacy software solutions that can save you time and money during your compliance journey.

How to Contact the Owner of a Domain | WhoisXML API

The Internet is one giant marketplace. If you are looking for a software-as-a-service (SaaS) option that you can use for your department, a simple Google search will give you dozens of them. Meanwhile, if you need someone to promote your business, the Internet can suggest several influencers depending on your niche. Once you find a company or person that matches your requirements, all of you have to do next is to contact the domain owner or website representative(s).

Contacting them may be easy

WHOIS vs GDPR Dispute: Does WHOIS Have a Future Under GDPR Rule? - Blog - Whoisology

WHOIS vs GDPR Dispute: Does WHOIS Under GDPR Rule?

The EU’s General Data Protection Regulation, or GDPR for short, saw the light of the day on 25th May, 2018 and it’s a buzzword in the IT world. Not surprisingly, opinions about GDPR differ from one side to the other and nowhere is this more evident than in the case of WHOIS.

The big question here is how does GDPR affect WHOIs and can you even use WHOIS registrars under GDPR?

The conflict basically boils down to this: once you register a domai

Preventing Transactions Fraud By Using IP Data

2020 has so far been a good year for online businesses. The recent lockdowns have supercharged an already growing trend: online buying.It is estimated that in 2020 alone we will have spent over $4 trillion dollars online. This figure is projected to double by 2024, reaching a whopping USD 8 trillion.While such accelerated growth means more opportunities for online retail, it also poses a higher risk of online scams and ultimately more losses.In the US alone, more than 3 out of 4 merchants have b...

Top 7 PHP development techniques to minimize security vulnerabilities

If you own a website, there’s a high chance (82.9% according to W3Techs) that it is based on PHP.

As a programing language, PHP is incredibly popular for its ability to create dynamic websites, not to mention that it is free and requires no licensing fee, so anyone (with some programming knowledge) can use it.

However, PHP is not bulletproof, and you may see some vulnerability here and there. Hackers and bots will try to exploit these weaknesses and gain access to your website, so it’s importa

End-to-end encryption: How does it work?

With threats looming constantly in the digital world, using end-to-end encryption and digital signatures has become a necessity to protect your data online. Read this article to learn how these two work together in Mailfence.

Let’s first explain what are end-to-end encryption.

End-to-end encryption or E2EE is a method of securing data in transit (while moving from the source to its destination).

In simple terms, data in plaintext goes through an encryption algorithm, which produces a cipherte