Australia Requires Ransomware Victims to Declare Payments Security A new Australian law requires larger companies to declare any… rooter June 2, 2025 1 min read 0
What are Cloud Security Standards? Security Cloud security standards define formalized policies, procedures, and controls designed… rooter June 2, 2025 1 min read 0
What Does Your Security Posture Talk About Your Security? Security In March 2024, a major US-based healthcare provider fell victim… rooter June 2, 2025 1 min read 0
This month in security with Tony Anscombe – May 2025 edition Security From a flurry of attacks targeting UK retailers to campaigns… rooter May 31, 2025 1 min read 0
Fix Firefox Error code: SSL_ERROR_RX_RECORD_TOO_LONG Security When Firefox throws up the error SSL_ERROR_RX_RECORD_TOO_LONG, it’s not just… rooter May 30, 2025 2 min read 0
Friday Squid Blogging: NGC 1068 Is the “Squid Galaxy” Security I hadn’t known that the NGC 1068 galaxy is nicknamed… rooter May 29, 2025 1 min read 0
Surveillance Via Smart Toothbrush Security The only links are from The Daily Mail and The… rooter May 29, 2025 1 min read 0
CISO Spotlight: Mike Wilkes on Building Resilience in an Evolving Threat Landscape Security Mike Wilkes has had a career many cybersecurity professionals could… rooter May 29, 2025 7 min read 0
Word to the wise: Beware of fake Docusign emails Security Cybercriminals impersonate the trusted e-signature brand and send fake Docusign… rooter May 29, 2025 1 min read 0
Location Tracking App for Foreigners in Moscow Security Russia is proposing a rule that all foreigners in Moscow… rooter May 28, 2025 1 min read 0