Contributed Articles

Shocking Ransomware Leaves Johannesburg Residents Without Electricity | Popcorn Training | 29 July 2019
How to Avoid being the next organisation to be harpooned by phishing | Global Banking & Finance | 11 July 2019
HowTo Enable Effective Security Awareness Training | Infosecurity Magazine | 7 June 2019
Taking Security Seriously | Infosecurity Magazine | 24 May 2019
Hope for the Best, Plan for the Worst | MSSP Alert | 29 March 2010
SIEM platforms come of age in raging battle against cybercrime | TEISS | 24 February 2019
Security Have and Have-Nots | Cyber Defense Magazine | 4 February 2019

Data breaches and the blame game | TEISS | 13 September 2018
Cyber resilience: Why hoping for the best & planning for the worst is the new norm | SC Magazine | 25 July 2018
Preventing the Cloud from Becoming a Digital Dumping Ground | Infosecurity Magazine | 8 May 2018
How the Cybersecurity skills gap is changing the way we work | TEISS 8 May 2018
Five ways you could get your company into trouble without realising it | IT Pro Portal | 16 April 2018
How to do More With Less in Cybersecurity | Infosecurity Magazine | 13 April 2018
780 Days in the Life of a Computer Worm | Dark Reading | 27 March 2018
Information security misconceptions | CSO Online | 20 March 2018
Overcoming data overload in cyber-security | SC Magazine | 6 March 2018
If time is money, what exactly is data? | CSO Online | 7 February 2018
Mental Models & Security: Thinking Like a Hacker | Dark Reading | 16 January 2018

It’s not your parents’ SIEM | CSO Online | 12 December 2017
Real Editor Meets Guest Editor: Q&A with Javvad Malik | Infosecurity Magazine | 12 December 2017
Guest Editor: Let’s Talk About Data Breaches | Infosecurity Magazine | 12 December 2017
When the going gets tough, security gets serious | SC Magazine | 21 November 2018
Be afraid of the dark web – or learn to monitor it | CSO Online | 31 October 2017
Halloween horrors and how to avoid falling victim | IT Pro Portal | 30 October 2017
If data is the new oil, then Equifax just caused a huge environmental disaster | CSO Online | 28 September 2017
A 9-step guide to prepare for GDPR compliance | Information Management | 21 September 2017
Cyber Attack Trends: Detection, Response, and Cure | Infosecurity Magazine | 5 September 2017
Putting the cyber in crime | CSO Online | 25 August 2017
Cutting through complexity in cloud security to increase visibility | SC Magazine | 1 June 2017
Nothing new to (Wanna)Cry about | CSO Online | 31 May 2017
Non-Security Tips for Security Professionals | Infosecurity Magazine | 3 May 2017
Is your company spending on the right security technologies? | CSO Online | 21 April 2017
Well-funded doesn’t mean well-secured | CSO Online | 10 March 2017
Threats Converge: IoT Meets Ransomware | Dark Reading | 6 March 2017
How to Hold on to Your Workforce During the Job Hunting Season | Infosecurity Magazine | 25 January 2017
The Internet Of Ransomware | Huffington Post | 19 January 2017
3 tips to improve threat detection and incident response | CSO Online | 18 January 2017

What can we expect from cyber-security in 2017? | IT Pro Portal | 22 December 2016
Five ways cybersecurity is nothing like the way Hollywood portrays it | CSO Online | 15 December 2016
MELT Away Scams This Winter | Huffington Post | 9 December 2016
8 security tips for retailers and consumers this holiday season | CSO Online | 30 November 2016
Human behaviour in organisational security – Frontline defense or lost cause? | IT Pro Portal | 22 November 2016
Overcoming risks in the digital supply chain | UK Tech News | 7 September 2016
Threat Intelligence Sharing: The Only Way to Combat Our Growing Skills Gap | Infosecurity Magazine | 11 May 2016