6 12, 2023 Velma’s Top Active Exploits – November 2023 Ellie Rose2024-03-27T10:07:20+00:00December 6th, 2023| Read More
22 11, 2023 Strengthening Wi-Fi Networks: Addressing Security Concerns and Recommendations Ellie Rose2024-02-16T15:34:58+00:00November 22nd, 2023| Read More
13 11, 2023 Platform Improvements: Nessus, Qualys and Burp Ellie Rose2023-10-31T11:45:59+00:00November 13th, 2023| Read More
6 11, 2023 Vulnerability Correlation Database and Enhanced Tenant Overview Ellie Rose2023-10-31T11:38:03+00:00November 6th, 2023| Read More
3 11, 2023 Customisable SLA Email and Project Velma Ellie Rose2023-10-31T12:08:34+00:00November 3rd, 2023| Read More
1 11, 2023 Velma’s Top Active Exploits – October 2023 Ellie Rose2024-03-27T09:54:31+00:00November 1st, 2023| Read More
25 10, 2023 Attack Surface Management vs Vulnerability Management Ellie Rose2023-11-28T11:29:48+00:00October 25th, 2023| Read More
20 10, 2023 A Social-able Phish – A Tale of Meta Ellie Rose2023-10-20T14:44:17+00:00October 20th, 2023| Read More
11 10, 2023 Vulnerability Management Trends Ellie Rose2024-03-27T09:46:51+00:00October 11th, 2023| Read More
11 10, 2023 What is Vulnerability Management? Ellie Rose2024-04-09T09:41:29+00:00October 11th, 2023| Read More