Featured

solarWinds 4

The SolarWinds Cyber Attack

by Tanzeer Hossain In December of 2020, the world witnessed one of the most sophisticated cyberattacks in history: the SolarWinds...
darkweb

Fundamentals of the dark web

By Angela Okeke-Ramos The internet is formed of multiple layers. Similar to the ocean only a fraction of these layers...
bridge

The value of mutual TLS for API authentication

By Robert Grigoras. The security and privacy of data exchanged between different systems through APIs is of utmost importance. API...

IOT – progress or cyber madness?

I was on the underground (train) recently, staring at the myriad of adverts that adorn the carriages. Amongst the adverts...
shutterstock_164458049-e1478984364710

Hear no evil, see no evil – cyber awareness

  What you don't know can't hurt right? Wrong! The issue with most organisations is that they are waiting for...
Trusted-Security

Trusted security

How do you know that you are your mother's child? How can you be sure that the chef in that...
credit-card-1591492_1280

Secrets (and lies)

Phase 3  - The execution Somewhere in a call centre…. Call centre operative: Hello, helpdesk, how can I be of assistance?...