Is Basic Authentication too basic?

Before getting into the age-old authentication dilemma, let’s start with an explanation of what authentication really is.  Authentication and authorisation are, in fact, two different things that work together as a complete solution. Authentication refers …

Find out more

Apache Log4j 2

Log4j 2, widely used in applications and services, is now subject to a vulnerability discovered Friday 10th December (CVE-2021-44228). The vulnerability has received a rating of 10 on the CVSS scale and is causing disruption …

Find out more

Hardware Hacks

When we talk about computer security, a lot of the focus is on the software and networks that we use – but never, ever, do we think about our hardware, or hardware that can be …

Find out more