The protection of sensitive company networks and critical infrastructures is increasingly in focus, also in view of a tense security situation. In many cases, cyber security concepts currently in use are being put to the test.


More

Dark Reading: Selecting the Right Authentication Protocol for Your Business

Authentication protocols like passkeys serve as the backbone of online security, enabling users to confirm…

Read More →

TechCrunch: X adds support for passkeys globally on iOS

X has officially extended support for passkeys to all global iOS users. This news was…

Read More →

Tech Telegraph: 5 easy tasks to supercharge your cybersecurity

This post summarises five ways for consumers to improve their cybersecurity. FIDO USB keys and…

Read More →