This blog offers a run-through and some analysis on this week's announcement by Apple that they're shifting the computer ranges to run on their own ARM-based silicon, instead of traditional Intel-based chips.
This blog provides an update on coronavirus related threats, and covers our own research in using certificate transparency logs to identify malicious domain registration.
Everyone knows about the traditional threat of phishing, but what about BEC, credential phishing or sextortion? This blog covers the continuing threat of phishing, as well as some of the newer threats.
In the spirit of community, here are the key lessons I learnt from attending the AWS community day.