![solarWinds 4 solarWinds 4](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/solarWinds-4-e1715275723839-landscape.jpg)
The SolarWinds Cyber Attack
by Tanzeer Hossain In December of 2020, the world witnessed one of the most sophisticated cyberattacks in history: the SolarWinds...
![darkweb darkweb](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/darkweb-1024x512-landscape.jpg)
Fundamentals of the dark web
By Angela Okeke-Ramos The internet is formed of multiple layers. Similar to the ocean only a fraction of these layers...
![bridge bridge](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/bridge-1024x683-landscape.jpg)
The value of mutual TLS for API authentication
By Robert Grigoras. The security and privacy of data exchanged between different systems through APIs is of utmost importance. API...
![](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/shutterstock_300032192-300x200-landscape.jpg)
IOT – progress or cyber madness?
I was on the underground (train) recently, staring at the myriad of adverts that adorn the carriages. Amongst the adverts...
![shutterstock_164458049-e1478984364710 shutterstock_164458049-e1478984364710](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/shutterstock_164458049-e1478984364710-landscape.jpg)
Hear no evil, see no evil – cyber awareness
What you don't know can't hurt right? Wrong! The issue with most organisations is that they are waiting for...