Contributed Articles

UK Retail’s billion-pound blind spot | Retail Technology Review | 6 October 2025
The DEEP Matrix: Your Map to a Unified Defense | KnowBe4 | 6 October 2025
Why KB4-CON EMEA 2025 Should Be Your Must-Attend Cybersecurity Conference | KnowBe4 | 2 October 2025
Going DEEP: A Simple Framework for a Complex Problem | KnowBe4 | 1 October 2025
The Behavioral Science Behind the Click | KnowBe4 | 26 September 2025
Why Your Security Strategy Needs a Human Upgrade | KnowBe4 | 19 September 2025
Beyond the Audit Box: Building Security That Works in the Real World | KnowBe4 | 4 September 2025
A Practical Guide to the European Union’s Cybersecurity Funding for SMEs | KnowBe4 | 18 August 2025
Digital Factories, Digital Dangers: Why Manufacturing is a Prime Target for Cyberattacks | 16 July 2025
How a fake cybersecurity firm became a real threat | Techzine | 13 June 2025
How a Fake Cybersecurity Firm Became a Real Threat | KnowBe4 | 12 June 2025
The Worsening Landscape of Educational Cybersecurity | KnowBe4 | 3 JUne 2024
Beyond Credentials: When Every Data Point Becomes a Weapon | KnowBe4 | 2 June 2025
AI security: Balancing innovation with protection | Computer Weekly | 2 June 2025
The Lost Art of Writing Things Down | KnowBe4 | 27 May 2025
The Ransomware Threat: Still Alive and Kicking | KnowBe4 | 22 May 2025
Security Think Tank: What CISOs can learn from Signalgate | World of Software | 2 May 2025
Security Think Tank: What CISOs can learn from Signalgate | Computer Weekly | 2 May 2025
Agentic-AI causes threats to skyrocket through AI-automated phishing campaigns | Netzpalavar | 1 May 2025
How Organizational Culture Shapes Cyber Defenses | KnowBe4 | 24 April 2025
Broken Cyber Windows Theory | KnowBe4 | 22 April 2025
Powering Down Vulnerability: Securing the Energy Sector’s Supply Chain | KnowBe4 | 18 April 2025
Exploring the Implications of DORA | Information Security Buzz | 8 April 2025
Exploring the Implications of DORA: A New Global Standard For Financial Cybersecurity | KnowBe4 | 1 April 2025
Broken Cyber Windows Theory | CXO Digital Pulse | 19 March 2025
AI Agents: Transformative or Turbulent? | AIThority | 19 March 2025
How ‘Open Innovation’ Can Help Solve Problems Faster, Better & Cheaper | Dark Reading | 17 March 2025
The Myth of Geographic Immunity in Cybersecurity | KnowBe4 | 11 March 2025
From Madison Avenue to Malware | KnowBe4 | 7 February 2025
A guide to surviving (and learning from) a cyberattack | IT Web Africa | 28 January 2025
From Pig Butchering to People Talking | KnowBe4 | 20 January 2025
Deepfakes, Shallow Morals: The Real Issue Behind the UK’s Crackdown | KnowBe4 | 13 January 2025
Internal security threats – exposing the enemy within | BBrief | 7 January 2025
Cybersecurity 2025: Cloudy with a Chance of Breaches | Infosecurity Magazine | 1 January 2025

A growing geopolitical weapon | World Pipelines | 31 December 2024
ChatGPT, two years on: The impact on cybersecurity | TechRadar Pro | 9 December 2024
Unwrapping Cybersecurity: A Festive “Die Hard” Guide | KnowBe4 | 6 December 2024
Designing cyber-security for human nature | TEISS | 27 November 2024
The call is coming from inside the house – dealing with insider threats | SME Tech Guru | 22 November 2024
Dark Side of Deals: Emerging Scams for Black Friday, Cyber Monday and Giving Tuesday | KnowBe4 | 20 November 2024
Gear up to deal with insider threats | IT Online | 14 November 2024
The £3 Million Daily Heist | KnowBe4 | 28 October 2024
Where Do I Point the Camera? | KnowBe4 | 21 October 2024
What Spending 3 Hours in IKEA Taught Me About Cybersecurity Awareness | KnowBe4 | 15 October 2024
What Bletchley Park Can Teach Us About Building a Strong Security Culture | KnowBe4 | 7 October 2024
From Desire Paths to Security Highways: Lessons from Disney’s Approach to User-Centric Design | KnowBe4 | 2 October 2024
From Tetris to Minecraft: The Evolution of Security Awareness into Human Risk Management | KnowBe4 | 27 September 2024
The call is coming from inside the house – insider threats | IT Security Guru | 3 September 2024
Deceptive AI: A New Wave of Cyber Threats | KnowBe4 | 23 August 2024
The Long Road to Recovery Following a Ransomware Attack | KnowBe4 | 19 August 2024
Summer Lovin’ or Summer Scammin’? | KnowBe4 | 13 August 2024
Addressing the Frustrations and Concerns of Infosecurity Professionals | Infosecurity Magazine | 9 August 2024
Creating a Big Security Culture With a Tiny Button | KnowBe4 | 5 August 2024
IoT: Internet of Threats? | KnowBe4 | 29 July 2024
Deep fakes in Australian schools | ITWire | 24 July 2024
The Importance of Security Culture: When Telecom Giants Resort to Malware | KnowBe4 | 9 July 2024
The Curious Case of the Payroll Pilfering | KnowBe4 | 1 July 2024
The Double-Edged Sword of AI: Empowering Cybercriminals and the Need for Heightened Cybersecurity Awareness | KnowBe4 | 25 June 2024
Balancing Act: The European Union’s AI Act and the Quest for Responsible Innovation | KnowBe4 | 24 June 2024
My Hacker Story: A Cautionary Tale of Intern Antics and Cultural Learnings | Knowbe4 | 24 June 2024
The Indispensable World of Red Teaming | KnowBe4 | 20 June 2024
The Overlooked Truth: User Experience in Cybersecurity | KnowBe4 | 18 June 2024
The Global Reach of Cyber Threats: Why Security Awareness Training is More Important Than Ever | KnowBe4 | 14 June 2024
What is the current state of Security Culture in Europe? | TechRadar Pro | 19 June 2024
Breach or Bluff: Cyber Criminals’ Slippery Tactics | KnowBe4 | 7 June 2024
Don’t Let Criminals Steal Your Summer Fun | KnowBe4 | 22 May 2024
Augmented security: The impact of AR on cybersecurity | JoziGist | 10 May 2024
Phishing Failures: How Not to Phish Your Users | KnowBe4 | 30 April 2024
Preparing for AR’s Influence on Cybersecurity | Infosecurity Magazine | 12 April 2024
UK Councils Under Cyber Attack: The Urgent Need for a Culture of Cybersecurity and Resilience | KnowBe4 | 12 April 2024
The Cyber Achilles’ Heel: Why World Leaders and High-Profile Individuals Must Prioritise Cybersecurity | KnowBe4 | 8 April 2024
The Unsettling Leap of AI in Video Creation: A Glimpse Into Sora | KnowBe4 | 20 February 2024
Beyond Cookies: How to Enable Secure Navigation of the Web | Infosecurity Magazine | 20 February 2024
Augmented Security: The Impact of AR on Cybersecurity | KnowBe4 | 16 February 2024
Cupid’s Arrow of Cyber Scams | KnowBe4 | 14 February 2024
AI in Cyberspace: A Double-Edged Sword | KnowBe4 | 14 February 2024

How Security Awareness Training Can Help Bridge the Cybersecurity Skills Gap | Infosecurity Magazine | 22 November 2023
Remember, Remember: Guy Fawkes and Cybersecurity | IT Security Guru | 5 November 2023
Deepfakes: The Threat to Reality and How To Defend Against It | KnowBe4 | 26 September 2023
How to Prevent Risky Cybersecurity Behaviours Creeping into Your Organisation | Infosecurity Magazine | 13 September 2023
Protecting Patient Data: The Importance of Cybersecurity in Healthcare | KnowBe4 | 1 June 2023
Manufacturing a Defense Against Phishing | Infosecurity Magazine | 17 May 2023
How Long Does It Take To Recover From a Ransomware Attack? | KnowBe4 | 5 April 2023
Italy Bans ChatGPT: A Portent of the Future, Balancing the Pros and Cons | KnowBe4 | 4 April 2023
Latitude Forced To Stop Adding New Customers in Aftermath of Breach | KnowBe4 | 3 April 2023
Stay Ahead of the Game: Protect Yourself From Trojanized Chat Apps Targeting WhatsApp and Telegram Users | KnowBe4 | 27 March 2023
The Dangers of Vishing Campaigns and How To Protect Yourself | KnowBe4 | 24 March 2023
Business Email Compromise Is the Biggest Threat You Must Prepare For! | KnowBe4 | 21 February 2023
The curse of cybersecurity knowledge | KnowBe4 | 16 February 2023
The Dos and Don’ts of Infosec Event Attendance: Maximise Value, Minimise Nonsense | Assured | 15 February 2023
How to Keep Your Guard Up Against Romance Scams | Spiceworks | 8 February 2023
Find Out What the Latest Hiscox Report Reveals! | KnowBe4 | 7 February 2023
ChatGPT: A New Wave of Cybersecurity Concerns? | Infosecurity Magazine | 1 February 2023
Refund Scam Targeting Federal Agencies via RMM Software | KnowBe4 | 30 January 2023
Do Not Get Fooled Twice: Mailchimp’s Latest Breach Raises Alarm Bells – Protect Yourself Now! | KnowBe4 | 25 January 2023
How South Africa’s Largest Law Firm Was Fined R5.5m for Not Educating Customers | KnowBe4 | 19 January 2023

Understanding the Cure to the Healthcare Phishing Problem | The Journal of mHealth | 2 December 2022
Preparing for Online Shopping Scams This Holiday Season | Infosecurity Magazine | 25 Nov 2022
Holiday Package or Scam Message? Clickers Beware | KnowBe4 | 18 Nov 2022
A year in review: Phishing, security and culture | Intelligent CISO | 16 November 2022
CyberMonth: A Time to Change Behaviors | Infosecurity magazine | 25 October 2022
Unconventional Security Awareness Advice | KnowBe4 | 14 September 2022
How can the insurance industry get a grip on phishing? | Emerging Risks | 2 September 2022
Breaches & Cyberwar Driving Security Culture | KnowBe4 | 7 July 2022
How aligning cybersecurity with strategic objectives can protect your business | Word Economic Forum | 30 June 2022
Looking Beyond Phishing: The Deeper Issue within Security that Needs Addressing | Spiceworks | 23 June 2022
Digging Into the Science of Behaviour to Tackle Cyber Extortion | Infosecurity Magazine | 21 April 2022
Reduce Your Chances of Getting Scammed | KnowBe4 | 14 April 2022
Building robust security requires a recognition of our differences | teiss | 18 March 2022
Disruption 3.0 But Scams 1.0 | Infosecurity magazine | 9 February 2022
The Evolution and Future of Ransomware | KnowBe4 | 8 February 2022
QR Codes in the Time of Cybercrime | | KnowBe4 | 7 February 2022
The Benefits of Paranoia | KnowBe4 | | KnowBe4| 3 February 2022
2022 – Predictions for the Year Ahead | Infosecurity Magazine | 26 January 2022
In Order to Have Good Security Culture, Behaviour Comes First | KnowBe4 | 20 January 2022

A Look into 2022: A world triumphed by cybercrime? | Global Banking & Finance | December 2021
Protect & Thrive | The Digital Recruiter | 9 December 2021
#BlackFriday: The Holidays Are Around the Corner, and so Are the Scammers! | Infosecurity magazine | 24 November 2021
How social engineering contributes to successful ransomware attacks | ITProPortal | 22 October 2021
How Psychology Can Save Your Cybersecurity Awareness Training Program | Dark Reading | 21 October 2021
How To Bolster Cybersecurity Practices for Employees | Toolbox | 7 October 2021
Happy Cybersecurity Awareness Month 2021 from KnowBe4! | KnowBe4 | 1 October 2021
Controlling the top cause of ransomware – social engineering | Open Access Government | 27 August 2021
The cybersecurity ‘rule of three’ | Security on Screen | 10 August 2021
12 Steps to a Security Ignorance Program | KnowBe4 | 6 August 2021
What do these ransomware cartels have in common? | Security on Screen | 22 June 2021
The Legacy of Champions | IT Security Guru | 16 June 2021
A Prequel to Ransomware | Infosecurity Magazine | 26 May 202
Phishing for humans – what do the numbers teach us? | Security on Screen | 20 May 2021
How security culture invokes secure behaviour | 7 April 2021 | Infosecurity Magazine
Close to a year on: the impact of furlough on cybersecurity | Association of MBAs | 1 March 2021
Running headfirst into a breach | KnowBe4 | 23 Feb 2021
Top 5 remote working mistakes to avoid | Cyber Vigilance | 17 Feb 2021
Best practices for building a security culture program | Security Infowatch | 7 January 2021
Five Key Cybersecurity Themes from 2020 | Infosecurity magazine | 6 January 2021

5 tips for consolidating remote work tech debt | KnowBe4 | 14 December 2020
Embarrassment is better than regret | KnowBe4 | 8 December 2020
Computer security day | KnowBe4 | 30 November 2020
Beware of Black Friday deals that are too good to be true | KnowBe4 | 23 November 2020
Cyber Security Awareness Month is Over… Now What? | KnowBe4 | 9 November 2020
Manipulation by disinformation : How elections are swayed | KnowBe4 | 3 November 2020
Out of Bounds Communication | KnowBe4 | 30 October 2020
Disinformation and the CISO | Infosecurity magazine | 28 October 2020
Breathing insider fraud requires a new culture | Payment Source | 27 October 2020
The Ultimate Cyber Security Tip | KnowBe4 | 23 October 2020
5 Cyber Security Awareness Month Tips for Cybersecurity Professionals | KnowBe4 | 15 October 2020
If you connect it, protect it | RSA | October 6 2020
The invisible risk | IT Security Guru | 23 September 2020
The Seven Dimensions of Security Culture: Attitudes | KnowBe4 | 20 August 2020
Is the Security Department a Barrier for Progression or are they Misunderstood? | Infosecurity Magazine | 19 August 2020
Are Account Takeovers Driving Towards a Passwordless Future? | KnowBe4 | 28 July 2020
When data manipulates you | TEISS | 9 July 2020
What Furlough means for cybersecurity | Think Digital Partners | 6 July 2020
How Local Authorities Can Combat Security Risks With Cyber Training | Trustmarque | 6 July 2020
The Challenge of Third-Party Compliance Management | Infosecurity Magazine | 2 July 2020
Why isn’t my security awareness campaign working? | SBL | 24 June 2020
The face of APT actors | KnowBe4 | 18 June 2020
Furloughed workers : Threats, anxiety, and staying away from work | KnowBe4 | 9 June 2020
Overcoming the security culture hurdle for the modern-day security leader | IT PRo Portal | 5 June 2020
How Low Can They Go? | KnowBe4 | 2 June 2020
Money from Crude Data | Security Info Watch | 28 May 2020
7 Steps to unleashing the creative hacker within | Technative | 27 May 2020
Explain Encryption to me | IT Security Guru |12 May 2020
Is being technical the most desired trait for a CISO? | SC Magazine | 12 May 2020
We’re all third-party management orgs | KnowBe4 | 5 May 2020
7 tips to optimise security | TEISS | 14 April 2020
Removing Zoom Meeting ID’s: Treating the Symptom, Not the Cause | KnowBe4 | 10 April 2020
Simulating COVID-19 Phishing Emails | Infosecurity Magazine | 8 April 2020
Seven tips to optimize security | KnowBe4 | 7 April 2020
Explain encryption to me | (ISC)2 | 2 April 2020
A technical risk assessment of COVID-19 | IT Security Guru | 1 April 2020
An Uber Phish | KnowBe4 | 31 March 2020
How to assess and prioritize insider threat risk | Tech Target | 30 March 2020
The Paradox of Perfection | KnowBe4 | 27 March 2020
Inception: Your Employee’s Mind is the Scene of the Crime | KnowBe4 | 26 March 2020
The real insider threat is the use of security software | Techradar Pro | 23 March 2020
Cybersecurity in financial services | Global & Banking Finance | 19 March 2020
The Most Important Thing When Working From Home | KnowBe4 | 16 March 2020
The RSA Survival Guide | IT Security Guru | 21 February 2020
Marry, date, or dump your security tech | Tech Aeris | 13 February 2020
Happy hotel with a sad ending | KnowBe4 | 15 January 2020
The Seven Real Security Predictions | Infosecurity Magazine | 8 January 2020

Dancing with Hackers | KnowBe4 | 19 December 2019
Microsoft Sees Phishing on the Rise | KnowBe4 | 11 December 2019
Using Threat Intelligence to build data-driven defence | Intelligence CISO | 3 December 2019
Year in Review: Security Awareness | Infosecurity Magazine | 2 December 2019
Don’t worry about Ransomware | KnowBe4 | 18 November 2019
Nudging Towards a Secure World | Infosecurity magazine | 16 October 2019
What Footballers Wives Can Teach Us About Cybersecurity | KnowBe4 | 15 October 2019
Security Awareness for the Masses | Infosecurity Magazine | 25 September 2019
Gambling on cybersecurity | EGR | 12 September 2019
Shocking Ransomware Leaves Johannesburg Residents Without Electricity | Popcorn Training | 29 July 2019
How to Avoid being the next organisation to be harpooned by phishing | Global Banking & Finance | 11 July 2019
HowTo Enable Effective Security Awareness Training | Infosecurity Magazine | 7 June 2019
Taking Security Seriously | Infosecurity Magazine | 24 May 2019
Security through transparency | AlienVault | 23 April 2019
Hope for the Best, Plan for the Worst | MSSP Alert | 29 March 2010
RSA 2019 – A Case of the Blues | AlienVault | 15 March 2019
SIEM platforms come of age in raging battle against cybercrime | TEISS | 24 February 2019
Securing People | AlienVault | 20 February 2019
Security Have and Have-Nots | Cyber Defense Magazine | 4 February 2019
Ways to Respond to a Breach | AlienVault | 29 January 2019
How to Be an InfoSec Thought Leader | AlienVault | 24 January 2019

The REAL 2019 Cyber Security Predictions | AlienVault | 13 December 2018
Protecting the Wrong Things | AlienVault | 5 December 2018
Let’s Talk about Segregation of Duties | AlienVault | 20 November 2018
Spicing up the MSSP World | AlienVault | 29 October 2019
Why Spending More On Security Isn’t The Answer | AlienVault | 23 October 2018
Data breaches and the blame game | TEISS | 13 September 2018
Cyber Security Awareness Month – Phishing | AlienVault | 4 September 2018
The Black Hat Recap | AlienVault | 13 August 2018
Hope for the Best, Plan for the Worst | AlienVault | 30 July 2018
Cyber resilience: Why hoping for the best & planning for the worst is the new norm | SC Magazine | 25 July 2018
15 Ways to Deal with Badly Written Risks | AlienVault | 9 July 2019
Cloud Based Security | AlienVault | 3 July 2018
Preventing the Cloud from Becoming a Digital Dumping Ground | Infosecurity Magazine | 8 May 2018
How the Cybersecurity skills gap is changing the way we work | TEISS 8 May 2018
Let’s be Fools | AlienVault | 19 April 2018
Five ways you could get your company into trouble without realising it | IT Pro Portal | 16 April 2018
How to do More With Less in Cybersecurity | Infosecurity Magazine | 13 April 2018
Life of a Worm | AlienVault | 11 April 2018
780 Days in the Life of a Computer Worm | Dark Reading | 27 March 2018
Information security misconceptions | CSO Online | 20 March 2018
An Interview with Graham Cluley | AlienVault | 7 March 2018
Overcoming data overload in cyber-security | SC Magazine | 6 March 2018
If time is money, what exactly is data? | CSO Online | 7 February 2018
Mental Models & Security: Thinking Like a Hacker | Dark Reading | 16 January 2018
I Am Dave | AlienVault | 2 January 2018

It’s not your parents’ SIEM | CSO Online | 12 December 2017
Real Editor Meets Guest Editor: Q&A with Javvad Malik | Infosecurity Magazine | 12 December 2017
Guest Editor: Let’s Talk About Data Breaches | Infosecurity Magazine | 12 December 2017
The Impact of NotPetya and WannaCry | AlienVault | 11 December 2017
Six Cybersecurity Predictions for The Year Ahead | AlienVault | 7 December 2017
5 Retail Security Tips: Don’t Let Hackers Ruin the Holiday Season | AlienVault | 24 November 2017
Jeremiah Grossman: On InfoSec Basics, Incentives, and Warranties | AlienVault | 22 November 2017
When the going gets tough, security gets serious | SC Magazine | 21 November 2018
BSides Lisbon and the Global Community | AlienVault | 16 November 2017
Steve Ragan: Writing for Impact | AlienVault | 15 November 2017
Be afraid of the dark web – or learn to monitor it | CSO Online | 31 October 2017
Halloween horrors and how to avoid falling victim | IT Pro Portal | 30 October 2017
Culture Eats Security for Lunch | AlienVault | 9 October 2017
How to Stay Safe Online – Tips for Regular Folks | AlienVault | 2 October 2017
If data is the new oil, then Equifax just caused a huge environmental disaster | CSO Online | 28 September 2017
A 9-step guide to prepare for GDPR compliance | Information Management | 21 September 2017
Cyber Attack Trends: Detection, Response, and Cure | Infosecurity Magazine | 5 September 2017
Putting the cyber in crime | CSO Online | 25 August 2017
Governments and Backdoors | AlienVault | 13 June 2017
Cutting through complexity in cloud security to increase visibility | SC Magazine | 1 June 2017
Nothing new to (Wanna)Cry about | CSO Online | 31 May 2017
Lucky Security | AlienVault | 25 May 2017
Innovation for the Sake of Innovation | AlienVault | 16 May 2017
Making Sense of WannaCry | AlienVault | 14 May 2017
What Got CISOs Here, Won’t Get CISOs There | AlienVault | 11 May 2017
The General Data Protection Regulation (GDPR) | AlienVault | 9 May 2017
Non-Security Tips for Security Professionals | Infosecurity Magazine | 3 May 2017
Is your company spending on the right security technologies? | CSO Online | 21 April 2017
Ten Data Centre Migration Pitfalls | AlienVault | 12 April 2017
Fool Me Once, Shame on You | AlienVault | 30 March 2017
Change is Automatic, Progress is Not | AlienVault | 15 March 2017
Well-funded doesn’t mean well-secured | CSO Online | 10 March 2017
Threats Converge: IoT Meets Ransomware | Dark Reading | 6 March 2017
Planning for an InfoSec Conference | AlienVault | 17 February 2017
Top 3 Considerations Before Buying a Security Product | AlienVault | 10 February 2017
IT Security Party Tricks | AlienVault | 1 February 2017
How to Hold on to Your Workforce During the Job Hunting Season | Infosecurity Magazine | 25 January 2017
The Internet Of Ransomware | Huffington Post | 19 January 2017
3 tips to improve threat detection and incident response | CSO Online | 18 January 2017
The Internet of Ransomware | AlienVault | 12 January 2017

The Fundamentals of SecOps that 2016 Forgot | AlienVault | 28 December 2016
What can we expect from cyber-security in 2017? | IT Pro Portal | 22 December 2016
Five ways cybersecurity is nothing like the way Hollywood portrays it | CSO Online | 15 December 2016
Money, Happiness, & Breaches: Views from Spiceworks IT Professionals | AlienVault | 13 December 2016
MELT Away Scams This Winter | Huffington Post | 9 December 2016
8 security tips for retailers and consumers this holiday season | CSO Online | 30 November 2016
Human behaviour in organisational security – Frontline defense or lost cause? | IT Pro Portal | 22 November 2016
IoT: Usability Dream or Privacy Nightmare? | AlienVault | 16 November 2016
Understanding the Mirai Threat on IoT – Open Letter to Manufacturers | AlienVault | 1 November 2016
The Mirai Botnet, Tip of the IoT Iceberg | AlienVault | 22 October 2016
Seven Tips For Optimizing Security | AlienVault | 19 October 2016
Vulnerability Scanning – Tip Tuesday for NCSAM | AlienVault | 18 October 2016
Overcoming Skill Gaps, Shortages, and Recruitment Challenges in InfoSec | AlienVault | 17 October 2016
Behavioral Monitoring – Tip Tuesday for NCSAM | AlienVault | 11 October 2016
Knowing Your Assets – Tip Tuesday for NCSAM | AlienVault | 4 October 2016
Ransomware Raises the Question: Establishing the Value of Data | AlienVault | 29 September 2016
Blackhat 2016: Threat Intelligence Déjà vu | AlienVault | 20 September 2016
Changing Business, and Risks of the Supply Chain | AlienVault | 8 September 2016
Overcoming risks in the digital supply chain | UK Tech News | 7 September 2016
Can You Explain Encryption to Me? | AlienVault | 22 August 2016
2016 Gartner Magic Quadrant for SIEM: A Visionary Feast | AlienVault | 11 August 2016
Naming Security | AlienVault | 7 July 2016
Clicking With The Enemy | AlienVault | 28 June 2016
Are Businesses Prepared for GDPR? | AlienVault | 14 June 2016
Infosecurity Europe 2016, a Recap | AlienVault | 11 June 2016
The Community of Extra-ordinary Aliens | AlienVault | 17 May 2016
Threat Intelligence Sharing: The Only Way to Combat Our Growing Skills Gap | Infosecurity Magazine | 11 May 2016
A Day in the Life of Darth-CISO: Happy Star Wars Day! | AlienVault | 4 May 2016
Open Source, the Community, and Aliens | AlienVault | 12 April 2016
Privacy, The Feds and Government Surveillance – RSA and Spiceworks Survey Results | AlienVault | 15 March 2016
One Change to Improve Security | AlienVault | 11 March 2016
Seven Alien Highlights From RSA 2016 | AlienVault | 4 March 2016
Writing Risk Statements in Infosec | AlienVault | 3 March 2016
7 Cyber Security Movies That Need to Be Made | AlienVault | 12 February 2016
Tweetchat roundup: Is Pop Culture Making Cybersecurity Sexy? | AlienVault | 9 February 2016
The 7 Strangest Places People Have Lost Data | AlienVault | 28 January 207
The Challenge of Retaining IT Security Skills – Blood on HR’s Floor | AlienVault | 27 January 2016

2015 SANS Analytics & Intelligence Survey | AlienVault | 12 November 2015
Questions are the answers | AlienVault | 11 November 2015
The toughest thing about working in IT | AlienVault | 4 October 2015
Disclosing Vulnerabilities, Using Data Dumps & Sharing Threat Intelligence | AlienVault | 29 September 2015
Black Hat 2015 – Recap | AlienVault | 10 August 2015
Black Hat 2015 – AlienVault Booth | AlienVault | 6 August 2015
2015 Gartner Magic Quadrant for SIEM: Visionary Aliens | AlienVault | 21 July 2015
Insider Threats Defined | AlienVault | 6 July 2015
Securing data in the cloud: What’s so different? Tweetchat Roundup! | AlienVault | 30 June 2015
Keep Calm and Snoop On | AlienVault | 9 June 2015
Talks, awards and high fives | AlienVault | 8 June 2015
Is Infosec Different in the UK Versus USA? | AlienVault | 3 June 205
The European Security Perspective | AlienVault | 1 June 2015
When Bad Things Happen in Good Software | AlienVault | 13 May 2015
Ethics, security, and getting the job done | AlienVault | 13 May 2015
50 Shades of Threat Intelligence | AlienVault | 4 May 2015
Climbing rocks, not ladders | AlienVault | 31 March 2015