11 10, 2023 What is Vulnerability Management? Ellie Rose2024-04-09T09:41:29+00:00October 11th, 2023| Read More
11 10, 2023 Vulnerability Management SLA Ellie Rose2024-03-21T13:02:01+00:00October 11th, 2023| Read More
5 10, 2023 Velma’s Top Active Exploits – September 2023 Ellie Rose2024-03-06T11:08:28+00:00October 5th, 2023| Read More
2 10, 2023 Attack Surface Analysis: Identifying, Mapping and Managing Attack Surface Ellie Rose2024-02-26T17:26:46+00:00October 2nd, 2023| Read More
11 09, 2023 Transforming Red Team Assessments: The Impact of AI Ellie Rose2024-02-12T17:12:10+00:00September 11th, 2023| Read More
5 09, 2023 Velma’s Top Active Exploits – August 2023 Ellie Rose2024-03-06T11:08:39+00:00September 5th, 2023| Read More
23 08, 2023 Rootshell Platform’s Velma Threat AI: Enhanced Threat Intelligence for Proactive Defense Ellie Rose2024-02-12T17:16:26+00:00August 23rd, 2023| Read More
16 08, 2023 Safeguarding Against SMSishing Attacks: Best Practices for Protection Ellie Rose2024-02-12T17:14:41+00:00August 16th, 2023| Read More
14 08, 2023 Rootshell Successfully Renews FSQS Accreditation Ellie Rose2024-02-12T17:14:09+00:00August 14th, 2023| Read More