Businesses have been clamoring to understand how cybersecurity insurance works and we explain everything this week with our special guest. Rehana Moosa is the founder of a forensic accounting firm and...
Apple recently announced it will begin reporting Child Sexual Abuse Material (CSAM) to law enforcement with the latest iOS 15 update. The new system aims to identify images using a process called...
APTs are said to be the most menacing cyber attacks in existence. Designed to be stealthy, gain access to corporate networks and steal secrets, APTs can cause crippling damage to businesses and...
Stalkerware is monitoring software which enables a remote user to track the activities of another user’s device. With stalkerware appearing in news headlines around the world, this week we discuss...
With Bitcoin leading the downward spiral of crypto currency values, Ranson and Tony take a look at the factors which have contributed to the rollercoaster ride in the crypto market. In recent weeks,...
Last week McDonald’s and Electronic Arts revealed they were the latest victims of cyberattacks and they likely won’t be the last. Especially after a massive leak of 8.4 billion passwords on the Dark...