Security
Recent Articles
Sort Options:

Code Signing in the DevOps Era: Silver Bullet or Security Theater?
In the quest for speed and automation, the article emphasizes that code signing is often viewed as a panacea, yet it should be integrated into a broader trust strategy for optimal security and effectiveness.

PSA Certified: A Security Framework for All Digital Devices – Not Just Internet-Connected Ones
In an era of increasing digital connectivity, cybersecurity risks extend beyond internet-connected devices. The PSA Certified framework is essential for manufacturers to ensure robust security from the chip level up, meeting evolving global regulations and building consumer trust.

The Secret Ingredient Of Cybersecurity
The article explores the elusive concept of good enough cybersecurity, questioning what standards define success in protecting digital assets. It emphasizes the need for a balanced approach to security that meets organizational needs without overextending resources.

Security vs. usability: Why rogue corporate comms are still an issue
A significant political incident arose in March 2025 due to a leak of American military operations. The Security Think Tank explores valuable lessons for Chief Information Security Officers (CISOs) to prevent similar potentially catastrophic errors in the future.

Secure by design: the MOD's honest take
The Ministry of Defence's recent document on 'Secure by Design' highlights the complexities of embedding security from the outset. It emphasizes collaboration across teams and acknowledges the challenges of information sharing and maintaining security over long-term projects.

Identity Security Has an Automation Problem—And It's Bigger Than You Think
New research from Cerby highlights a concerning reality in identity security, revealing that fewer than 4% of security teams have fully automated core identity workflows, indicating a heavy reliance on human intervention rather than robust systems.

Security Theater or Real Defense? The KPIs That Tell the Truth
The article emphasizes that effective cybersecurity transcends data collection, focusing instead on demonstrating the efficacy of defense mechanisms. It explores key performance indicators (KPIs) that reveal the true strength of security measures.

Simplifying End-to-End Security with Expert Web3 Security Audits
Implementing multi-signature wallets and conducting thorough smart contract audits are essential for enhancing asset management security. The authors emphasize the importance of collaboration, continuous training, and third-party assessments to identify vulnerabilities and strengthen defenses against potential breaches.

Building Resilient Identity Systems: Lessons from Securing Billions of Authentication Requests
As the workforce shifts to digital, identity security emerges as a critical focus in enterprise cybersecurity. With 40 billion daily authentication requests, solutions must ensure seamless user experiences while effectively blocking cyber threats, as 81% of data breaches stem from compromised credentials.

The Role Of Compliance Certifications In Tech Excellence
As companies strive for responsible growth, prioritizing customer security expectations becomes crucial. The publication highlights the importance of balancing scalability with robust security measures to foster trust and satisfaction among consumers.

Building Trust Through Effective Cybersecurity
Effective cybersecurity measures significantly reduce risks such as data breaches, ransomware, and unauthorized access, ensuring better protection for sensitive information. The publication emphasizes the importance of proper implementation to safeguard digital assets in today's threat landscape.

Reevaluating SSEs: A Technical Gap Analysis of Last-Mile Protection
Security Service Edge (SSE) platforms are essential for securing hybrid work and SaaS access, offering centralized enforcement and policy control. However, they overlook critical user activity occurring in browsers, highlighting a significant gap in their security architecture.

Uniqkey
The article emphasizes the importance of securing user logins to enhance confidence in online access. It highlights strategies for protecting sensitive information, ensuring a safer digital experience for users across various platforms.