Tag: technology
-
Snyk is shutting down the securityheaders.com API

For many in the web security community, securityheaders.com has been a familiar and trusted tool for years. Originally created by Scott Helme, it helped raise the baseline for HTTP security headers across the web, not through flashy reports, but by making the right things visible and measurable. Over time, the project evolved: In April 2025,…
-
Zone Files: The Only Authoritative Source and Why They’re Still Hard

When people talk about “total domain coverage”, they’re often talking past one another. Some mean registration. Some mean DNS resolution. Some mean recent activity. These are related, but they are not the same thing. A zone file is the registry’s authoritative publication. It shows which domains are delegated in DNS under a top-level domain (TLD)…
-
Why You Should Enable Apple’s Stolen Device Protection Today

Smartphones have become far more than communication devices – they’re the keys to our digital lives. Banking apps, email, photos, passwords, health data, even the ability to unlock your front door or car – all of it may be accessible through your iPhone. That makes losing it to theft or opportunistic “shoulder surfing” more dangerous…
-
Why Domain Monitoring is Essential for Microsoft Entra Security

When we think about protecting Microsoft Entra tenants, the conversation often revolves around user identities, conditional access, and multi-factor authentication. Those are all critical – but one piece is often overlooked: verified domains. These domains are the foundation of your organisation’s identity. They determine how email flows, which services are trusted, and ultimately, how people…
