Tech Categories

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.

Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled “I Have No Mouth, And I Must Do Crime”, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.

The Microsoft Azure service that had 80 vulnerabilities in one year

As the range of cloud services on offer grows, one might expect a corresponding increase in vulnerabilities – but for Microsoft, one cloud service experienced a disproportionately high number compared to others, writes James Maude, Lead Cyber Security Researcher, BeyondTrust.

From the Archives