Insights

Can we be certain AI keeps cloud data secure

What Are Non-Human Identities, and Why Are They Crucial for Cloud Security? One might ask, what role do non-human identities (NHIs) play in safeguarding cloud...

Is your data truly secure with free AI tools

How Can Businesses Ensure the Security of Non-Human Identities? When was the last time your company evaluated the security of its machine identities? With the...

Sonatype Named DevOps Dozen Winner for Best DevSecOps Solution

The DevOps landscape is changing faster than ever. As organizations race to deliver software at speed, they’re also inheriting a new class of risk —...

Access Token vs Refresh Token: Key Differences & When to Use Each

Why basic load tests fail for auth systems Ever spent weeks tuning a service only to have the login page crawl at 20 seconds...

JWT Claims Explained: Complete Guide to Standard & Custom JWT Token Claims

The Evolution of Federated Learning and Quantum Threats Ever wonder why federated learning is such a big deal? It’s supposed to keep data safe...

Passwordless Authentication vs MFA: Security, UX & Implementation Compared

The State of Authentication in 2025 Honestly, if i have to deal with one more "Forgot Password" ticket this week, i might just lose...

Trending News

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

Social Media The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they...

Is it time for internet services to adopt identity verification?

Social Media Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters. Tony Anscombe 14 Jan 2026...

Your personal information is on the dark web. What happens next?

If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what...

Credential stuffing: What it is and how to protect yourself

Digital Security Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts Christian Ali Bravo 08...

This month in security with Tony Anscombe – December 2025 edition

As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this...

A brush with online fraud: What are brushing scams and how do I stay safe?

Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to...