Passkeys: The future of secure and seamless authentication Security What are passkeys? You may have seen the term “passkeys”… rooter February 5, 2025 5 min read 0
OpenText Secure Cloud: Streamline workflows with integrations Security Simplifying security management is an important step toward better protection… rooter February 5, 2025 2 min read 0
On Generative AI Security Security Microsoft’s AI Red Team just published “Lessons from Red Teaming… rooter February 5, 2025 1 min read 0
Deepfakes and the 2024 US Election Security Interesting analysis: We analyzed every instance of AI use in… rooter February 4, 2025 1 min read 0
Crypto Scams on the Rise Security Crypto currencies are the promise of profit to the unsuspecting… rooter February 4, 2025 1 min read 0
MDR for MSPs: Navigating EDR compatibility Security When it comes to endpoint detection and response (EDR) compatibility… rooter February 3, 2025 4 min read 0
Journalists and Civil Society Members Using WhatsApp Targeted by Paragon Spyware Security This is yet another story of commercial spyware being used… rooter February 3, 2025 1 min read 0
The Cybersecurity Landscape of 2024: Key Insights from the Annual Vulnerability Report Security The 2024 Annual Vulnerability Report from SecPod reveals a staggering… rooter February 3, 2025 1 min read 0
Threat Replay Testing: Turning Attackers into Pen Testers Security In war, as Sun Tzu taught us, the better you… rooter February 3, 2025 5 min read 0
Weekly Update 437 Security Presently sponsored by: 1Password Extended Access Management: Secure every sign-in… rooter February 2, 2025 2 min read 0