Dec 17, 2025 | Uncategorized
Passkeys are different from traditional username-based approaches to passwordless sign-in and MFA. This article explains how to design the most effective passkey experience for users, with a focus on web browsers as the platform. Username-initiated...
Dec 15, 2025 | Uncategorized
In cybersecurity, convenience often comes at a cost. Synced passkeys—touted for their ability to work seamlessly across multiple devices—are a prime example. While they simplify access, recent research shows they can introduce serious vulnerabilities, potentially...
Dec 8, 2025 | Uncategorized
Cyberattacks are increasing in both scale and complexity, making data protection one of the most critical challenges facing organizations today. While traditional security controls — such as firewalls, antivirus software, and network monitoring — continue to play an...
Dec 8, 2025 | Articles, Articles, Articles, Articles
Recently, several people have asked about the syslog-ng project’s position on AI. In short, the answer is one of cautious optimism. We are open to using AI, but we do not allow it to take over any critical responsibilities from human developers. What does this...