Identity Security

Data Breach at Sydney University Exposes 27,500
Data Protection & Privacy Data Breach at Sydney University Exposes 27,500

With us today is Rupert Marais, our in-house Security Specialist, whose expertise in endpoint security and cybersecurity strategy offers a vital perspective on digital threats. We’ll be exploring the recent University of Sydney data breach to understand the deeper issues at play. Our conversation

Is Microsoft OAuth the New Phishing Backdoor?
Identity & Access Management Is Microsoft OAuth the New Phishing Backdoor?

The familiar blue and white of a Microsoft login page has become a universal symbol of digital security, yet it is now the very camouflage used by cybercriminals to bypass an organization's most robust defenses. A sophisticated new wave of phishing attacks is turning this trusted interface into a

Enterprises Struggle to Secure Non-Human Identities
Identity & Access Management Enterprises Struggle to Secure Non-Human Identities

The silent, automated workforce of non-human identities now underpins nearly every critical function of the modern enterprise, yet a severe and widely acknowledged security deficit has left organizations dangerously exposed. While these digital entities—from service accounts to API keys—are the

MITRE Reveals 2025's Most Dangerous Software Weaknesses
Identity & Access Management MITRE Reveals 2025's Most Dangerous Software Weaknesses

As the digital landscape becomes increasingly complex and interconnected, the annual release of MITRE's list of the most dangerous software weaknesses offers a critical navigational chart for cybersecurity professionals, guiding efforts to secure the foundational code upon which modern society

Hacker Pleads Guilty in $600K DraftKings Cyberattack
Identity & Access Management Hacker Pleads Guilty in $600K DraftKings Cyberattack

We are joined today by Rupert Marais, our in-house security specialist, to dissect a recent high-profile case where a fantasy sports betting platform lost $600,000 after a massive cyberattack. We will explore the anatomy of these credential stuffing schemes, from the acquisition of stolen passwords

GitHub Actions Drive Surge in Supply Chain Attacks
Identity & Access Management GitHub Actions Drive Surge in Supply Chain Attacks

A concerning trend has taken hold in 2025 as the software development landscape faces a sharp escalation in supply chain attacks, with threat actors now systematically targeting the automated workflows at the heart of the world's largest code repository. Malicious actors are exploiting the immense

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later