Authentication

image of imagined Tangerine Telecoms building under cyberattack

The Cyberattack on Tangerine Telecom

By Tanzeer Hossain In February 2024, Tangerine Telecom, a prominent Australian internet and mobile service provider, became the latest victim...
Graphic of padlocks, one of them open

Passwords

By Roddy Passwords, pah! Old-fashioned, insecure. Don’t cha just hate ‘em? Well no, they’re OK, especially if handled thoughtfully and...
Golden Gate Bridge at sunset with a warm sky.

The value of mutual TLS for API authentication

By Robert Grigoras. The security and privacy of data exchanged between different systems through APIs is of utmost importance. API...
Cursor hovering over the word 'Security' on a digital screen.

Passwords and Paranoia

By Anton Scott. The issue with universal passwords We have all been there, midway through creating a new account for...
Person wearing a Guy Fawkes mask using a laptop in a dark setting.

The importance of Ethical Hacking

By Shameer Sabar. As technology advances, and organisations incorporate more and more IT systems into their business in order to...
Digital devices protected by a shield labeled 'Data Security'.

Personal Cyber Hygiene

by Kate Dinnison The Office for National Statistics estimates that there were 2.46 million cyber incidents and 2.11 million victims...
A lock pick tool placed on several credit cards.

Secrets (and lies)

Phase 3  - The execution Somewhere in a call centre…. Call centre operative: Hello, helpdesk, how can I be of assistance?...