Authorization & Authentication

Are Passkeys the Future of Passwordless Authentication?
Identity & Access Management Are Passkeys the Future of Passwordless Authentication?

Rupert Marais is renowned for his expertise in security strategy, specializing in endpoint and device protection, cybersecurity frameworks, and network management. His insights are invaluable for understanding today's complex security landscape. In this interview, we'll explore various aspects of

Are Your Favorite Apps Vulnerable to Supply Chain Attacks?
Infrastructure & Network Security Are Your Favorite Apps Vulnerable to Supply Chain Attacks?

A startling revelation has surfaced that underscores the lurking vulnerability of widely used digital tools. With the ever-growing dependency on technology and online business platforms, a sophisticated supply chain attack has recently come to light, raising questions about the safety of e-commerce

How Are Attackers Exploiting Windows Task Scheduler Flaws?
Malware & Threats How Are Attackers Exploiting Windows Task Scheduler Flaws?

Rupert Marais, our in-house Security specialist, brings extensive expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we delve into the multifaceted vulnerabilities discovered in the Windows task scheduling service, a critical component frequently

How Can Businesses Battle Ever-Evolving Cyber Threats?
Malware & Threats How Can Businesses Battle Ever-Evolving Cyber Threats?

In a world where digital transformation drives innovation and operational efficiency, businesses increasingly find themselves contending with a broad spectrum of rapidly evolving cyber threats. The pace at which these threats develop and infiltrate systems poses significant challenges, making it

Advanced Phishing Scheme Exploits Google Tools for Attacks
Infrastructure & Network Security Advanced Phishing Scheme Exploits Google Tools for Attacks

Rupert Marais, our in-house Security specialist, dives deep into the intricacies of the recent phishing attack that exploited both Google Sites and DKIM replay tactics. This attack is notable not only for its sophistication but also for the clever manipulation of Google's infrastructure to send

How Can AI Outsmart and Defend Against Rapidly Evolving Identity Fraud?
Security Operations & Management How Can AI Outsmart and Defend Against Rapidly Evolving Identity Fraud?

Artificial intelligence (AI) is revolutionizing many fields, including cybersecurity. As identity fraud becomes increasingly sophisticated, AI technologies are being deployed both by attackers to create more convincing false identities and by defenders to develop robust security measures. This

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later