Authorization & Authentication

Phishing Mastermind Noah Urban Pleads Guilty: What Happens Next?
Malware & Threats Phishing Mastermind Noah Urban Pleads Guilty: What Happens Next?

In a case that has sent shockwaves through the cybersecurity world, Noah Urban, a key figure behind the notorious Scattered Spider cybercrime ring, has pleaded guilty. Urban, widely known by several online aliases including 'Sosa' and 'Elijah,' has been implicated in a series of damaging phishing

Enhancing Cloud Security: Observability's Crucial Role
Infrastructure & Network Security Enhancing Cloud Security: Observability's Crucial Role

Adopting cloud infrastructure quickly often leaves security lagging behind. This article explores the importance of incorporating observability into cloud security to bridge this gap effectively. The Rush to Cloud Adoption and Security Challenges Disparity in Cloud Adoption and Security Readiness

Are You Ready for Outlook's 2025 Email Security Changes?
Infrastructure & Network Security Are You Ready for Outlook's 2025 Email Security Changes?

Microsoft's recent announcement on the implementation of new security requirements for high-volume email senders on Outlook stresses the importance of enhancing email authentication to mitigate spam and spoofing risks. These changes are pivotal in the industry's forward march toward more secure and

Oracle Faces Second Data Breach, 6 Million Records Compromised
Infrastructure & Network Security Oracle Faces Second Data Breach, 6 Million Records Compromised

In a startling turn of events, Oracle Corporation experienced a significant data breach involving its older Gen 1 servers, making it the company's second cybersecurity incident within weeks. The breach came to light after a threat actor, known as "rose87168," claimed responsibility and disclosed

Is Your Data Safe in Oracle Cloud After the Recent Breach?
Infrastructure & Network Security Is Your Data Safe in Oracle Cloud After the Recent Breach?

The Oracle Corporation recently faced a major cybersecurity incident that has drawn considerable concern among its users and the tech community at large. Sensitive data from Oracle’s cloud services was allegedly accessed and stolen, including millions of records, credentials, encryption keys, and

How to Balance User Privacy with Essential Website Cookies
Identity & Access Management How to Balance User Privacy with Essential Website Cookies

In today's digital landscape, securing user data and ensuring privacy have become paramount. Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management, joins us to share his insights on Identity Access

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later