Blog post

Torotoro became a trademark in New Zealand.

Torotoro just passed its first birthday a few weeks ago and now became a registered trademark in New Zealand by IPONZ of the Government. Hopefully it will give greater trust to our customers and partners, and a bigger headache to our beloved competitors as a visible differentiator:) We believe that investing into proper marketing and […]

Dec 11, 2023

Torotoro just passed its first birthday a few weeks ago and now became a registered trademark in New Zealand by IPONZ of the Government.

Hopefully it will give greater trust to our customers and partners, and a bigger headache to our beloved competitors as a visible differentiator:)

We believe that investing into proper marketing and branding practices is not just good for these specific areas, but for general trust and even for security as market can distinguish between real security companies and wannabes.

About the Author

Jozsef worked as a CISO in a central hospital and in a school district. He is the founder and owner of Torotoro Ltd. He holds the following certifications: Security+ - CompTIA - 2023 Security Consultant - Ministry of Justice NZ - 2023 Certified Cyber Security Professional – Google – 2023 NZPA – NZ Privacy Commissioner – 2022 OPSWAT Certified Cyber Security Associate – OPSWAT – 2022 OSINT training – European Security Academy – 2021 Fortinet NSE – Fortinet - 2020 Virtual Agile Teams – IIL/PMI – 2020 ISO 27001 Lead Auditor – TÜV Rheinland InterCert Germany – 2019 NZQE recognized Level 7 General Informatics Diploma - 1996

Related Posts

Why kiwis are suffering in cyber?
Why kiwis are suffering in cyber?

Many experts say that Kiwis are suffering in cyber.
Especially in the SME sector, which means family and private businesses.
Let us enumerate a few reasons for this.

2023 CWE Top 25 Most Dangerous Software Weaknesses released

CWE or Common Weakness Enumeration table shows what are the typical (most frequent and critical) software vulnerabilities in software based on the US National Vulnerability Database (NVD). As they stated: “An attacker can often exploit these vulnerabilities to take...

Subscribe

Comments

0 Comments