Unlock a safer future: Swap your Google password for a cutting-edge passkey today 07/05/2023 – Posted in: Information Security

Time needed to read: 4 minutes Good news for those who detest passwords—Google is one step closer to being password-free as it has now made passkeys available to all individual account users. Google has unveiled a feature that permits you to log into your account from any device using a PIN or biometric, such as your face or fingerprint, rendering that pesky password obsolete. If you want to take advantage of this innovation, you can…

Continue reading

Understanding Azure Ad Authentication: What You Need To Know 14/04/2023 – Posted in: Cloud, Information Security

Introduction Azure Active Directory (Azure AD) is Microsoft’s cloud-based identity and access management (IAM) service. It provides a secure, scalable, and user-friendly platform for organizations to manage and control access to applications and resources. In this blog post, we will delve into Azure AD authentication, its benefits, and how to set it up for your applications. We will also explore real-world examples to better understand the practical applications of Azure AD authentication. Understanding Azure AD…

Continue reading

Understanding OWASP: The Top 10 Security Risks Every Developer Should Know 01/04/2023 – Posted in: Information Security, Penetration Testing

Time to read: 5-7 minutes OWASP, or the Open Web Application Security Project, is an open-source community focused on improving the security of software. OWASP provides a framework for developers to build secure applications, and they publish a list of the top 10 security risks every year. In this article, we’ll go over what OWASP is, why it’s important, and the top 10 security risks that developers should be aware of. What is OWASP? OWASP…

Continue reading

Active Directory: An Introduction and Overview 30/03/2023 – Posted in: Technology

Time to Read: 3 minutes. Active Directory (AD) is a technology developed by Microsoft that provides centralized authentication, authorization, and management of users, computers, and other resources in a networked environment. AD is widely used in enterprise environments and is a critical component of many Windows-based networks. What is Active Directory? At its core, Active Directory is a hierarchical database that stores information about objects in a networked environment. Objects can include users, computers, groups,…

Continue reading