Authorization & Authentication

Hackers Actively Exploit Critical Fortinet Flaws
Identity & Access Management Hackers Actively Exploit Critical Fortinet Flaws

With threat actors actively exploiting two critical Fortinet flaws just days after their disclosure, the race between patching and exploitation is on. We're joined by Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, to break down the technical

Is Microsoft OAuth the New Phishing Backdoor?
Identity & Access Management Is Microsoft OAuth the New Phishing Backdoor?

The familiar blue and white of a Microsoft login page has become a universal symbol of digital security, yet it is now the very camouflage used by cybercriminals to bypass an organization's most robust defenses. A sophisticated new wave of phishing attacks is turning this trusted interface into a

Enterprises Struggle to Secure Non-Human Identities
Identity & Access Management Enterprises Struggle to Secure Non-Human Identities

The silent, automated workforce of non-human identities now underpins nearly every critical function of the modern enterprise, yet a severe and widely acknowledged security deficit has left organizations dangerously exposed. While these digital entities—from service accounts to API keys—are the

MITRE Reveals 2025's Most Dangerous Software Weaknesses
Identity & Access Management MITRE Reveals 2025's Most Dangerous Software Weaknesses

As the digital landscape becomes increasingly complex and interconnected, the annual release of MITRE's list of the most dangerous software weaknesses offers a critical navigational chart for cybersecurity professionals, guiding efforts to secure the foundational code upon which modern society

After a $4.5B Toll, Is the Ransomware Tide Turning?
Identity & Access Management After a $4.5B Toll, Is the Ransomware Tide Turning?

A landmark report from the U.S. Treasury’s Financial Crimes Enforcement Network has cast a stark light on the ransomware epidemic, revealing that cybercriminals have successfully extorted at least $4.5 billion from victims since 2013. The data exposes an alarming acceleration in criminal

Are You Vulnerable to Critical Fortinet, Ivanti, SAP Flaws?
Identity & Access Management Are You Vulnerable to Critical Fortinet, Ivanti, SAP Flaws?

We’re joined today by Rupert Marais, our in-house security specialist, to dissect a recent wave of critical vulnerabilities that have put major enterprise vendors on high alert. Fortinet, Ivanti, and SAP—names central to the IT infrastructure of countless organizations—have all rushed to patch

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later