• The password-less future

    Microsoft's recently announcement that users can delete passwords and adopt a password-less environment using alternative authentication such as an authenticator app. Does this signal the beginning of…

  • Cybersecurity insurance explained

    Businesses have been clamoring to understand how cybersecurity insurance works and we explain everything this week with our special guest. Rehana Moosa is the founder of a forensic accounting firm and…

  • Apple to begin reporting Child Sexual Abuse Material (CSAM)

    Apple recently announced it will begin reporting Child Sexual Abuse Material (CSAM) to law enforcement with the latest iOS 15 update. The new system aims to identify images using a process called…

  • What is an Advanced Persistent Threat?

    APTs are said to be the most menacing cyber attacks in existence. Designed to be stealthy, gain access to corporate networks and steal secrets, APTs can cause crippling damage to businesses and…

  • The sinister nature of Stalkerware

    Stalkerware is monitoring software which enables a remote user to track the activities of another user’s device. With stalkerware appearing in news headlines around the world, this week we discuss…

  • The crypto crackdown

    With Bitcoin leading the downward spiral of crypto currency values, Ranson and Tony take a look at the factors which have contributed to the rollercoaster ride in the crypto market. In recent weeks,…