My TED Talks Security I have spoken at several TED conferences over the years.… rooter May 3, 2024 1 min read 0
Pay up, or else? – Week in security with Tony Anscombe Security Organizations that fall victim to a ransomware attack are often… rooter May 3, 2024 1 min read 0
Rare Interviews with Enigma Cryptanalyst Marian Rejewski Security The Polish Embassy has posted a series of short interview… rooter May 3, 2024 1 min read 0
Weekly Update 398 Security Presently sponsored by: Kolide believes that maintaining endpoint security shouldn’t… rooter May 3, 2024 2 min read 0
The UK Bans Default Passwords Security The UK is the first country to ban default passwords… rooter May 2, 2024 1 min read 0
Don’t have a Modern Antivirus? Learn why you shouldn’t be taking this risk! Security 20 years ago, antivirus softwares were primarily focused on generic… rooter May 2, 2024 1 min read 0
Adding insult to injury: crypto recovery scams Security Once your crypto has been stolen, it is extremely difficult… rooter May 2, 2024 1 min read 0
AI Voice Scam Security Scammers tricked a company into believing they were dealing with… rooter May 1, 2024 1 min read 0
CISA guidelines to protect critical infrastructure against AI-based threats Security The US government’s cybersecurity agency CISA published a series of… rooter April 30, 2024 2 min read 0
Introducing the Wallarm Q1 2024 API ThreatStats™ Report Security As we have in previous editions of the ThreatStats report,… rooter April 30, 2024 3 min read 0