Authentication

image of imagined Tangerine Telecoms building under cyberattack

The Cyberattack on Tangerine Telecom

By Tanzeer Hossain In February 2024, Tangerine Telecom, a prominent Australian internet and mobile service provider, became the latest victim...
Graphic of padlocks, one of them open

Passwords

By Roddy Passwords, pah! Old-fashioned, insecure. Don’t cha just hate ‘em? Well no, they’re OK, especially if handled thoughtfully and...
bridge

The value of mutual TLS for API authentication

By Robert Grigoras. The security and privacy of data exchanged between different systems through APIs is of utmost importance. API...
security-265130_1920

Passwords and Paranoia

By Anton Scott. The issue with universal passwords We have all been there, midway through creating a new account for...
anonymous-4165613_1920

The importance of Ethical Hacking

By Shameer Sabar. As technology advances, and organisations incorporate more and more IT systems into their business in order to...
Cyber-Hygiene

Personal Cyber Hygiene

by Kate Dinnison The Office for National Statistics estimates that there were 2.46 million cyber incidents and 2.11 million victims...
credit-card-1591492_1280

Secrets (and lies)

Phase 3  - The execution Somewhere in a call centre…. Call centre operative: Hello, helpdesk, how can I be of assistance?...