by Dr David Day | Dec 5, 2024 | Blog
Since the turn of the century, the amount and complexity of cybersecurity threats have continually been on the rise. Penetration testing (pen testing) has quickly become an essential method for identifying vulnerabilities before malicious actors exploit them. A pen...
by Dr David Day | Oct 7, 2024 | Blog
Penetration testing, often called “pen testing,” is vital in today’s cybersecurity strategies. Essentially, it simulates an attack on a system, network, or application to uncover vulnerabilities that malicious actors could target. By replicating the...
by Dr David Day | Sep 27, 2024 | Blog
ChatGPT, developed by OpenAI, represents a significant advancement in the field of artificial intelligence (AI) and natural language processing (NLP). As a large language model (LLM), it can generate human-like text, engage in detailed conversations, and assist with a...
by Dr David Day | Sep 19, 2024 | Blog
The frequency and sophistication of cyber threats are increasing. Organisations must proactively identify and mitigate vulnerabilities in their systems. Penetration testing is a key component of cybersecurity strategy and has evolved to include both manual and...
by Dr David Day | Jul 11, 2024 | Blog, Podcast
YouTube: IIoT, ICS & OT: The Hidden Technology of Modern Society | 404 Cybersecurity Not Found | Ep. 4 Spotify: IIoT, ICS & OT: The Hidden Technology of Modern Society | Ep. 4 Episode Summary In Episode #4 of the “404 Cybersecurity Not Found”...