Security controls

Tech worker

Active vs. Passive Cyber Security

By Roddy. There is a lot of confusing – or inconsistent - terminology in cyber security (‘Tactics’ in the MITRE...
bridge

The value of mutual TLS for API authentication

By Robert Grigoras. The security and privacy of data exchanged between different systems through APIs is of utmost importance. API...
abstract-access-close-up-1089438

Minimising risk in business: the relevance of cybersecurity and data protection

By Ivan Seifert. Despite being a term on everyone’s lips and an increasing wealth of information becoming available online, cybersecurity...