Data Classification for NPO’s Security A data classification system is a method of organising and… rooter February 15, 2023 1 min read 0
Load shedding and Cybersecurity Security Load shedding can make it difficult for businesses to maintain… rooter February 15, 2023 1 min read 0
Application Security Testing Security Application Security Testing has become a well developed and automated… rooter February 15, 2023 1 min read 0
WordPress <= 6.1.1 – Unauth. Blind SSRF vulnerability Security This WordPress vulnerability is described as an unauthenticated blind Server-Side… rooter February 15, 2023 1 min read 0
ChatGPT, will you be my Valentine? Security Spoiler alert: it turned me down. But that’s far from… rooter February 15, 2023 1 min read 0
Confident cybersecurity means fewer headaches for SMBs Security Small and medium-sized businesses have good reason to be concerned… rooter February 15, 2023 1 min read 0
Key findings from the latest ESET Threat Report – Week in security with Tony Anscombe Security What is behind the drop in ransomware and what should… rooter February 15, 2023 1 min read 0
ESET Threat Report T3 2022 Security A view of the T3 2022 threat landscape as seen… rooter February 15, 2023 1 min read 0
Alexa, who else is listening? Security Your smart speaker is designed to listen, but could it… rooter February 15, 2023 1 min read 0
Upcoming Speaking Engagements Security This is a current list of where and when I… rooter February 15, 2023 1 min read 0