Category: Security

Ransomware terms tag cloud
Computing
John Hoke

Ransomware Detection & Response

Ransomware attacks have been on the rise in recent years, causing significant financial and operational disruptions for organizations across various sectors. This brief guide covers

Read More »
OWASP Security - three monitors one malicious choose well
Computing
John Hoke

More OWASP fun with ChatGPT

Continuing to mess around with my research into things I can do with the ChatGPT-4 Large Language Model and training developers on some basics of

Read More »
Information Security Training - Keyboard showing a lock and SECURITY buttons
Security
John Hoke

Information Security Training: Why & How

Empowering Your Workforce to Safeguard Your Organization’s Digital Assets Introduction In today’s regulatory, litigious and online world, information security is a top priority for businesses

Read More »