Podcast

  • Cybersecurity insurance explained

    Businesses have been clamoring to understand how cybersecurity insurance works and we explain everything this week with our special guest. Rehana Moosa is the founder of a forensic accounting firm and...

  • Apple to begin reporting Child Sexual Abuse Material (CSAM)

    Apple recently announced it will begin reporting Child Sexual Abuse Material (CSAM) to law enforcement with the latest iOS 15 update. The new system aims to identify images using a process called...

  • What is an Advanced Persistent Threat?

    APTs are said to be the most menacing cyber attacks in existence. Designed to be stealthy, gain access to corporate networks and steal secrets, APTs can cause crippling damage to businesses and...

  • The sinister nature of Stalkerware

    Stalkerware is monitoring software which enables a remote user to track the activities of another user’s device. With stalkerware appearing in news headlines around the world, this week we discuss...

  • The crypto crackdown

    With Bitcoin leading the downward spiral of crypto currency values, Ranson and Tony take a look at the factors which have contributed to the rollercoaster ride in the crypto market. In recent weeks,...

  • Hacking McDonald’s and EA? What’s the world come to?

    Last week McDonald’s and Electronic Arts revealed they were the latest victims of cyberattacks and they likely won’t be the last. Especially after a massive leak of 8.4 billion passwords on the Dark...