Authorization & Authentication

Identity Risk Prioritization – Review
Identity & Access Management Identity Risk Prioritization – Review

The static security perimeter that once defined corporate safety has dissolved into a sprawling, chaotic web of interconnected permissions where a single forgotten API key can bring down a global enterprise. Traditional identity management has long been treated as a glorified task list, a

Ivanti Flaws Spark Attacks on European Governments
Identity & Access Management Ivanti Flaws Spark Attacks on European Governments

A critical security crisis has unfolded as two newly discovered zero-day vulnerabilities in Ivanti’s Endpoint Manager Mobile (EPMM) solution have triggered a wave of sophisticated cyberattacks, demonstrating with alarming clarity how quickly a single software flaw can escalate into an international

Password Manager Security – Review
Identity & Access Management Password Manager Security – Review

While designed as the ultimate bastion for our sprawling digital identities, the very concentration of our most sensitive credentials into a single digital vault transforms password managers into uniquely high-value targets for malicious actors. Password managers represent a significant advancement

Is NPM's New Security Armor Strong Enough?
Identity & Access Management Is NPM's New Security Armor Strong Enough?

The silent infiltration of the npm registry during the Sha1-Hulud incident sent a definitive shockwave through the open-source community, proving that trust in a package name alone was no longer a viable security strategy. In an ecosystem where millions of developers rely on interconnected

New ZeroDayRAT Malware Sells Nation-State Spying Tools
Malware & Threats New ZeroDayRAT Malware Sells Nation-State Spying Tools

We're joined today by Rupert Marais, our in-house security specialist, to discuss an alarming new trend in mobile threats. A new form of spyware, dubbed ZeroDayRAT, is being sold openly on platforms like Telegram, essentially packaging sophisticated surveillance tools for a mass-market criminal

Enabling Passkeys on Devices Without a Screen
Identity & Access Management Enabling Passkeys on Devices Without a Screen

The rapid expansion of connected technology has introduced a new class of devices, from immersive extended reality (XR) headsets to smart home hubs and industrial sensors, that often lack a traditional screen. This evolution presents a significant challenge to modern security practices,

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later