Brendan KotzeYou've been hacked! Now what?What should you do if you discover your accounts or systems were hacked? Security breaches come in many forms, dictating the context of...
Quentene FinneganShould you be worried about deepfake voices?Did Emma Watson, the actor who portrayed Hermoine in the Harry Potter movies, record audio clips of her reading the controversial book...
Brendan KotzeTips for a Security Incident Response PlanHow should one calculate the cost of a cybersecurity breach? Is it through brand and reputation damage, loss of important data, paying a...
Guy GolanIncident Response: Your Company's ICUWhen we are seriously ill, we seek medical care. If the situation is acute and dangerous, we go to the intensive care unit or ICU. The...
PerformantaAI's Disruption and Transformation of the Cybersecurity LandscapeArtificial Intelligence (AI) has been at the vanguard of this digital revolution, which has seen a spectacular spike in technical...
Guy GolanWhy treat DLP as a Business Tool?Data Loss Prevention (DLP) protects critical information from being stolen or lost. Yet, without business input and ownership,...