G  R O K
  • Home
  • About
  • Services
  • Blog
  • Contact Us
Sign in Subscribe

Featured

Privacy Engineering in a Post AI World

Privacy Engineering in a Post AI World

Blog
Sealed with a Quish - the Problem with Cybersecurity Terminology

Sealed with a Quish - the Problem with Cybersecurity Terminology

Blog
Seven Essential Strategies to Prevent and Detect Business Email Compromise

Seven Essential Strategies to Prevent and Detect Business Email Compromise

Blog
The Hidden Privacy Risk in Commercial VPN Services: Root Certificate Installation

The Hidden Privacy Risk in Commercial VPN Services: Root Certificate Installation

Blog
Next.js Vulnerability - CVE-2025-29927

Next.js Vulnerability - CVE-2025-29927

Blog
BSides London 2024

BSides London 2024

Blog
Yubikey Vulnerability - How Bad Is It?

Yubikey Vulnerability - How Bad Is It?

Blog
Should I be using AI in my business?

Should I be using AI in my business?

Blog
We need to talk about your backups

We need to talk about your backups

Blog

Blog

  • Log4j - Has your business been affected? What next?

  • We need to talk about your backups

  • Should I be using AI in my business?

  • Yubikey Vulnerability - How Bad Is It?

  • BSides London 2024

Show more →

News

  • We need to talk about your backups

  • Next.js Vulnerability - CVE-2025-29927

  • The Hidden Privacy Risk in Commercial VPN Services: Root Certificate Installation

  • Seven Essential Strategies to Prevent and Detect Business Email Compromise

  • Privacy Engineering in a Post AI World

Show more →
G R O K © 2025
  • Blog Sign up
Powered by Ghost