Surveillance in the US Security Good article from 404 Media on the cozy surveillance relationship… rooter June 20, 2025 1 min read 0
Cybersecurity Compliance in South Africa Security A Continued Cycle South Africa has had a slow approach… rooter June 20, 2025 1 min read 0
Veeam Patches CVE-2025-23121: Critical RCE Bug in Backup & Replication Security Veeam, a prominent data backup and disaster recovery solution provider,… rooter June 20, 2025 1 min read 0
Self-Driving Car Video Footage Security Two articles crossed my path recently. First, a discussion of… rooter June 19, 2025 1 min read 0
Shadow IT in the Cloud: Risks and Mitigation Strategies Security Cloud services have accelerated innovation by letting teams spin up… rooter June 19, 2025 1 min read 0
Five Uncomfortable Truths About LLMs in Production Security Many tech professionals see integrating large language models (LLMs) as… rooter June 19, 2025 5 min read 0
Predicted CVEs Likely to be Exploited – June 18, 2025 Security Stay Ahead of Tomorrow’s Threats, Today Welcome to your daily… rooter June 19, 2025 1 min read 0
Ghostwriting Scam Security The variations seem to be endless. Here’s a fake ghostwriting… rooter June 18, 2025 1 min read 0
Why PREVENT Is the Future of Cybersecurity Security Cybersecurity Doesn’t Have a Visibility Problem. It Has an Execution… rooter June 18, 2025 1 min read 0
Tips to make your summer travels cyber safe Security Ready, set, pack! Summer travel season is here and that… rooter June 17, 2025 8 min read 0