Thoughts Insights & Opinions

AI robot for the Elderly and Disabled
AI robot for the Elderly and Disabled

So, today we are looking at a big upside … The recent advancements in artificial intelligence (AI) technology, particularly showcased by Figure 01 from OpenAI, offer invaluable assistance to the elderly and disabled communities. This cutting-edge AI robot has the...

read more
You have agreed to this… and so have I.
You have agreed to this… and so have I.

If you are a WhatsApp User, this is for you. Most of us never read the Terms and Conditions When you sign up for a free service like WhatsApp, you may not realise that you're giving up certain rights to your content. In the case of WhatsApp, their terms of service...

read more
Four Horsemen of the EMAIL apocalypse
Four Horsemen of the EMAIL apocalypse

Join us on a journey into the heart of darkness as we uncover the Four Horsemen of the Email Apocalypse. From the Bangladesh Bank heist to the Russian election interference, these incidents serve as chilling reminders of the perils that lurk in our inboxes: 1....

read more
Top of the Pops in 2024: Cybersecurity
Top of the Pops in 2024: Cybersecurity

In a recent report from McKinsey & Company, Cybersecurity has emerged as the predominant tech concern for enterprise buyers, with an approximately 20 percent citing rate, a 50 percent increase from the previous year.   Given the increasing amount of sensitive...

read more
Meta accused of ‘massive, illegal’ data processing
Meta accused of ‘massive, illegal’ data processing

According to CNN, the European Consumer Organisation (BEUC), an umbrella body for 45 consumer groups, said eight of the groups were filing complaints with their respective national data protection authorities Thursday, accusing Meta, the owner of WhatsApp, Facebook...

read more
New and improved, better than ever NIST 2.0
New and improved, better than ever NIST 2.0

Version 2.0 of the National Institute of Standards and Technology (NIST) Cybersecurity Framework delivers several updates and enhancements to help organisations better manage cybersecurity risks. Here are four key improvements included in the most recent update:...

read more
The infamous Hillary Clinton email controversy
The infamous Hillary Clinton email controversy

The controversy surrounding Hillary Clinton's emails during her tenure as United States Secretary of State from 2009 to 2013 highlighted critical vulnerabilities in government communication channels. Critics voiced concerns over security risks and mishandling of...

read more
Hulle weet nie wat ons weet nie!
Hulle weet nie wat ons weet nie!

Pfortner, as a leading provider of cybersecurity solutions, places customer security at the forefront of our mission. To underscore our dedication to protecting sensitive data and communications, we have made a strategic choice not to release vulnerabilities on the Common Vulnerabilities and Exposures (CVE) database.

read more