document.body.classList.toggle('menu-open', show); // Add 'menu-open' class to body.

Category: Cyber Security Research

The cyber security research category shares articles on emerging threats, innovative defences and industry studies shaping the future of digital security.

Jan Masters
It’s time to get tough! In his latest blog, Jan Masters talks about some seriously advanced JWT security measures.
December 26, 2024
Jan Masters
In Jan Masters’ latest JWT blog, he discusses how JWTs are right at home in API-centric apps and why you should use them.
December 19, 2024
Jan Masters
In this blog, Jan Masters dives into the great debate when it comes to JWT storage: cookies or local storage?
December 12, 2024
th4ts3cur1ty.company - Meet The Team - Rich
Is network packet capture still useful today? TSC’s Head of Technology, Rich Benfield, explains why it’s not obsolete just yet!
December 9, 2024
Jan Masters
Token revocation and refresh is what Jan Masters is focusing on in the latest blog of his JWT Security series.
December 5, 2024
Jan Masters
In this new blog series about JWT security, Jan Masters gives us an introduction to this popular authentication tool.
November 28, 2024
Jan Masters
In this new blog series about JWT security, Jan Masters gives us an introduction to this popular authentication tool.
November 21, 2024
Jan Masters
In this new blog series about JWT security, Jan Masters gives us an introduction to this popular authentication tool.
November 18, 2024
Eliza-May Austin
As Halloween approaches TSC’s CEO, Eliza-May Austin, talks Zombie Files, Ghost Files, and the ghoulish hackers who exploit them.
October 7, 2024
Jan Masters
What exactly is entropy in computing and why should you care? Jan Masters explains everything you need to know about this realm of randomness, where not all chaos is created equal.
September 23, 2024