Insights

Sonatype Named DevOps Dozen Winner for Best DevSecOps Solution

The DevOps landscape is changing faster than ever. As organizations race to deliver software at speed, they’re also inheriting a new class of risk —...

Access Token vs Refresh Token: Key Differences & When to Use Each

Why basic load tests fail for auth systems Ever spent weeks tuning a service only to have the login page crawl at 20 seconds...

JWT Claims Explained: Complete Guide to Standard & Custom JWT Token Claims

The Evolution of Federated Learning and Quantum Threats Ever wonder why federated learning is such a big deal? It’s supposed to keep data safe...

Passwordless Authentication vs MFA: Security, UX & Implementation Compared

The State of Authentication in 2025 Honestly, if i have to deal with one more "Forgot Password" ticket this week, i might just lose...

Authentication Flow Explained: Step-by-Step Login & Token Exchange Process

The anatomy of a modern auth handshake Ever wonder why you can log into a healthcare portal using your google account without them ever...

Cyber Fraud, Not Ransomware, is Now Businesses’ Top Security Concern

Cyber fraud has overtaken ransomware to become the top cybersecurity concern of business leaders around the world, reflecting a global threat landscape that is...

Trending News

Is it time for internet services to adopt identity verification?

Social Media Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters. Tony Anscombe 14 Jan 2026...

Your personal information is on the dark web. What happens next?

If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what...

Credential stuffing: What it is and how to protect yourself

Digital Security Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts Christian Ali Bravo 08...

This month in security with Tony Anscombe – December 2025 edition

As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this...

A brush with online fraud: What are brushing scams and how do I stay safe?

Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to...

Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component

ESET researchers examined CVE‑2025‑50165, a serious Windows vulnerability described to grant remote code execution by merely opening a specially crafted JPG file – one of...