Configuring WS-Federation Single Sign-on for Resources
Why we still care about WS-Federation in a modern stack Ever feel like you're stuck in a time machine when...
Why we still care about WS-Federation in a modern stack Ever feel like you're stuck in a time machine when...
Behind the scenes of law enforcement in cyber: what do we know about caught cybercriminals? What brought them in, where...
Image: appshunter.io (Unsplash) If you’ve ever worried about who might try to reach you on WhatsApp, the company has a...
Counter Threat Unit™ (CTU) researchers are frequently asked about ransomware groups posing a threat to organizations in specific verticals or...
27 January 2026 It's the discussion about the reaction of some people in the UK regarding their impending social media...
The viral open-source assistant everyone's talking about is also a masterclass in why machine identity management matters more than ever....
The viral open-source assistant everyone's talking about is also a masterclass in why machine identity management matters more than ever....
The myth of the standing army and why you are wrong about your audience Ever feel like you are shouting...
The Enterprise Paradox: Why we still use XML in 2025 It's 2025 and we are still arguing about xml tags...
The UK's National Cyber Security Centre (NCSC) has issued a warning about the threat posed by distributed denial-of-service (DDoS) attacks...
The Evolution of Database Access in the Machine Era Ever wonder why we still talk about database security like it's...