❌

Normal view

Received yesterday β€” 13 February 2026

Some PR advice for the Andrew-stricken royals – try something that look less like a $12m cover-up | Marina Hyde

13 February 2026 at 07:45

A loan to keep the case out of court doesn’t quite add up to β€˜thoughts and prayers to Epstein’s victims’. Working with the police might be a start

β€œI could have worse tags than β€˜Air Miles Andy’,” the then Prince Andrew once reflected. β€œAlthough I don’t know what they are!” I think it’s safe to say he does now.

Almost all senior members of the royal family are biologically capable of sweating, and what really brought them out in a cold one four years ago was the thought of this honking liability testifying in a New York courtroom. So they paid millions upon millions to make sure it didn’t happen. The late Virginia Giuffre’s civil case alleging that the former prince abused her on three occasions in London, New York and the US Virgin Islands was never heard, because the late queen seems to have decided that it shouldn’t be at almost any cost. (Andrew denied all claims of wrongdoing.) And yet, as many of us predicted at the time, this would never be the end of it, and the royal family are now playing a failing game of catch-up with the institution’s own actions. Andrew’s de-princing – an attempt to keep it all in-house – already hasn’t worked.

Marina Hyde is a Guardian columnist

Do you have an opinion on the issues raised in this article? If you would like to submit a response of up to 300 words by email to be considered for publication in our letters section, please click here.

Continue reading...

Β© Photograph: Max Mumby/Indigo/Getty Images

Β© Photograph: Max Mumby/Indigo/Getty Images

Β© Photograph: Max Mumby/Indigo/Getty Images

Demystifying SAML: The Basics of Secure Single Sign-On

Learn the basics of SAML authentication for Enterprise SSO. Understand IdP vs SP roles, XML assertions, and how to secure your B2B infrastructure effectively.

The post Demystifying SAML: The Basics of Secure Single Sign-On appeared first on Security Boulevard.

Understanding Authentication Methods

Deep dive into authentication methods for B2B. Learn about SAML, OIDC, FIDO2, and passwordless flows to secure your enterprise apps and prevent data breaches.

The post Understanding Authentication Methods appeared first on Security Boulevard.

RFC 4058 – Authentication Protocol Overview

A deep dive into RFC 4058 authentication protocols for software development. Learn about key management, security requirements, and modern ciam implementation.

The post RFC 4058 – Authentication Protocol Overview appeared first on Security Boulevard.

Received before yesterday

What Is a Security Token Service?

Learn how a Security Token Service (STS) brokers trust in Enterprise SSO and CIAM. Explore token issuance, validation, and federated identity for CTOs.

The post What Is a Security Token Service? appeared first on Security Boulevard.

Orchid Security Adds Ability to Audit Behaviors by Identity

5 February 2026 at 11:30

Orchid Security today added an ability to conduct audits to its platform that enables cybersecurity teams to track behaviors of specific identities. Company CEO Roy Katmor said Identity Audit is designed to make it possible to unify proprietary audit data captured from unmanaged applications with audit logs data collected from third-party identity and access management..

The post Orchid Security Adds Ability to Audit Behaviors by Identity appeared first on Security Boulevard.

User-Managed Access (UMA) 2.0 Comprehensive Guide

Deep dive into UMA 2.0 for enterprise SSO and CIAM. Learn about protection api, RPT tokens, and how to implement party-to-party sharing in your IAM stack.

The post User-Managed Access (UMA) 2.0 Comprehensive Guide appeared first on Security Boulevard.

What is User Management in Single Sign-on?

understand how user management integrates with single sign-on (SSO). learn about directory sync, saml, oidc, and managing identities for enterprise apps.

The post What is User Management in Single Sign-on? appeared first on Security Boulevard.

Visa Application Process: Costs and Requirements

A deep dive into the Visa Application Process: Costs and Requirements for developers and tech firms. Learn about B-1/H-1B fees, ds-160 filing, and security protocols.

The post Visa Application Process: Costs and Requirements appeared first on Security Boulevard.

Enabling and Securing Basic Authentication: A Comprehensive Guide

Learn how to enable and secure basic authentication for enterprise systems. Guide covers tls encryption, credential hygiene, and sso migration for ctos.

The post Enabling and Securing Basic Authentication: A Comprehensive Guide appeared first on Security Boulevard.

The Future of Single Sign-on: Insights for 2025

Explore the evolution of Enterprise SSO and CIAM in 2025. Insights on SAML, passwordless authentication, and developer-first IAM solutions for CTOs.

The post The Future of Single Sign-on: Insights for 2025 appeared first on Security Boulevard.

User-Managed Access Overview

Explore User-Managed Access (UMA) 2.0 for enterprise CIAM. Learn how UMA extends OAuth 2.0 to provide fine-grained, asynchronous party-to-party authorization.

The post User-Managed Access Overview appeared first on Security Boulevard.

Configuring WS-Federation Single Sign-on for Resources

Learn how to configure WS-Federation SSO for enterprise resources. A deep dive into identity delegation, claim mapping, and securing legacy apps for engineering leaders.

The post Configuring WS-Federation Single Sign-on for Resources appeared first on Security Boulevard.

OAuth User-Managed Access Protocol Overview

Deep dive into OAuth User-Managed Access (UMA) for CTOs. Learn how UMA 2.0 improves CIAM, delegated authorization, and enterprise SSO security.

The post OAuth User-Managed Access Protocol Overview appeared first on Security Boulevard.

Web Single Sign-on with WS-Federation

Deep dive into Web Single Sign-on with WS-Federation. Learn how to implement secure federated identity, manage STS, and bridge legacy apps with modern CIAM.

The post Web Single Sign-on with WS-Federation appeared first on Security Boulevard.

The Complete Guide to Authentication Implementation for Modern Applications

A comprehensive developer guide to implementing secure authentication in modern applications. Covers OAuth 2.0, OIDC, passwordless authentication, passkeys, and enterprise SSO with production-ready code examples.

The post The Complete Guide to Authentication Implementation for Modern Applications appeared first on Security Boulevard.

πŸ’Ύ

How to Resolve Invalid Security Token Issues

Learn how to debug and fix invalid security token errors in Enterprise SSO, SAML, and CIAM systems. Practical tips for CTOs and VPs of Engineering.

The post How to Resolve Invalid Security Token Issues appeared first on Security Boulevard.

Exploring Identity Management and CardSpace Technology

A deep dive into the evolution of identity management and cardspace technology. Learn how modern enterprise sso and ciam solutions replace legacy frameworks.

The post Exploring Identity Management and CardSpace Technology appeared first on Security Boulevard.

Are Passkeys Safely Synced Across Multiple Devices?

Explore the security of passkey synchronization. Learn how end-to-end encryption and cloud providers keep passwordless authentication secure across devices.

The post Are Passkeys Safely Synced Across Multiple Devices? appeared first on Security Boulevard.

Single Sign-on Community Help Resources

Discover top community help resources for Single Sign-on, CIAM, and enterprise authentication. Learn where CTOs and VPs of Engineering find technical support.

The post Single Sign-on Community Help Resources appeared first on Security Boulevard.

User-Managed Access (UMA) 2.0 Explained

Deep dive into User-Managed Access (UMA) 2.0 for CTOs. Learn about RPT tokens, permission tickets, and how to scale ciam with asynchronous authorization.

The post User-Managed Access (UMA) 2.0 Explained appeared first on Security Boulevard.

❌