Contributed Articles


Manufacturing a Defense Against Phishing | Infosecurity Magazine | 17 May 2023
How Long Does It Take To Recover From a Ransomware Attack? | KnowBe4 | 5 April 2023
Italy Bans ChatGPT: A Portent of the Future, Balancing the Pros and Cons | KnowBe4 | 4 April 2023
Latitude Forced To Stop Adding New Customers in Aftermath of Breach | KnowBe4 | 3 April 2023
Stay Ahead of the Game: Protect Yourself From Trojanized Chat Apps Targeting WhatsApp and Telegram Users | KnowBe4 | 27 March 2023
The Dangers of Vishing Campaigns and How To Protect Yourself | KnowBe4 | 24 March 2023
Business Email Compromise Is the Biggest Threat You Must Prepare For! | KnowBe4 | 21 February 2023
The curse of cybersecurity knowledge | KnowBe4 | 16 February 2023
The Dos and Don’ts of Infosec Event Attendance: Maximise Value, Minimise Nonsense | Assured | 15 February 2023
How to Keep Your Guard Up Against Romance Scams | Spiceworks | 8 February 2023
Find Out What the Latest Hiscox Report Reveals! | KnowBe4 | 7 February 2023
ChatGPT: A New Wave of Cybersecurity Concerns? | Infosecurity Magazine | 1 February 2023
Refund Scam Targeting Federal Agencies via RMM Software | KnowBe4 | 30 January 2023
Do Not Get Fooled Twice: Mailchimp’s Latest Breach Raises Alarm Bells – Protect Yourself Now! | KnowBe4 | 25 January 2023
How South Africa’s Largest Law Firm Was Fined R5.5m for Not Educating Customers | KnowBe4 | 19 January 2023

Understanding the Cure to the Healthcare Phishing Problem | The Journal of mHealth | 2 December 2022
Preparing for Online Shopping Scams This Holiday Season | Infosecurity Magazine | 25 Nov 2022
Holiday Package or Scam Message? Clickers Beware | KnowBe4 | 18 Nov 2022
A year in review: Phishing, security and culture | Intelligent CISO | 16 November 2022
CyberMonth: A Time to Change Behaviors | Infosecurity magazine | 25 October 2022
Unconventional Security Awareness Advice | KnowBe4 | 14 September 2022
How can the insurance industry get a grip on phishing? | Emerging Risks | 2 September 2022
Breaches & Cyberwar Driving Security Culture | KnowBe4 | 7 July 2022
How aligning cybersecurity with strategic objectives can protect your business | Word Economic Forum | 30 June 2022
Looking Beyond Phishing: The Deeper Issue within Security that Needs Addressing | Spiceworks | 23 June 2022
Digging Into the Science of Behaviour to Tackle Cyber Extortion | Infosecurity Magazine | 21 April 2022
Reduce Your Chances of Getting Scammed | KnowBe4 | 14 April 2022
Building robust security requires a recognition of our differences | teiss | 18 March 2022
Disruption 3.0 But Scams 1.0 | Infosecurity magazine | 9 February 2022
The Evolution and Future of Ransomware | KnowBe4 | 8 February 2022
QR Codes in the Time of Cybercrime | | KnowBe4 | 7 February 2022
The Benefits of Paranoia | KnowBe4 | | KnowBe4| 3 February 2022
2022 – Predictions for the Year Ahead | Infosecurity Magazine | 26 January 2022
In Order to Have Good Security Culture, Behaviour Comes First | KnowBe4 | 20 January 2022

A Look into 2022: A world triumphed by cybercrime? | Global Banking & Finance | December 2021
Protect & Thrive | The Digital Recruiter | 9 December 2021
#BlackFriday: The Holidays Are Around the Corner, and so Are the Scammers! | Infosecurity magazine | 24 November 2021
How social engineering contributes to successful ransomware attacks | ITProPortal | 22 October 2021
How Psychology Can Save Your Cybersecurity Awareness Training Program | Dark Reading | 21 October 2021
How To Bolster Cybersecurity Practices for Employees | Toolbox | 7 October 2021
Happy Cybersecurity Awareness Month 2021 from KnowBe4! | KnowBe4 | 1 October 2021
Controlling the top cause of ransomware – social engineering | Open Access Government | 27 August 2021
The cybersecurity ‘rule of three’ | Security on Screen | 10 August 2021
12 Steps to a Security Ignorance Program | KnowBe4 | 6 August 2021
What do these ransomware cartels have in common? | Security on Screen | 22 June 2021
The Legacy of Champions | IT Security Guru | 16 June 2021
A Prequel to Ransomware | Infosecurity Magazine | 26 May 202
Phishing for humans – what do the numbers teach us? | Security on Screen | 20 May 2021
How security culture invokes secure behaviour | 7 April 2021 | Infosecurity Magazine
Close to a year on: the impact of furlough on cybersecurity | Association of MBAs | 1 March 2021
Running headfirst into a breach | KnowBe4 | 23 Feb 2021
Top 5 remote working mistakes to avoid | Cyber Vigilance | 17 Feb 2021
Best practices for building a security culture program | Security Infowatch | 7 January 2021
Five Key Cybersecurity Themes from 2020 | Infosecurity magazine | 6 January 2021

5 tips for consolidating remote work tech debt | KnowBe4 | 14 December 2020
Embarrassment is better than regret | KnowBe4 | 8 December 2020
Computer security day | KnowBe4 | 30 November 2020
Beware of Black Friday deals that are too good to be true | KnowBe4 | 23 November 2020
Cyber Security Awareness Month is Over… Now What? | KnowBe4 | 9 November 2020
Manipulation by disinformation : How elections are swayed | KnowBe4 | 3 November 2020
Out of Bounds Communication | KnowBe4 | 30 October 2020
Disinformation and the CISO | Infosecurity magazine | 28 October 2020
Breathing insider fraud requires a new culture | Payment Source | 27 October 2020
The Ultimate Cyber Security Tip | KnowBe4 | 23 October 2020
5 Cyber Security Awareness Month Tips for Cybersecurity Professionals | KnowBe4 | 15 October 2020
If you connect it, protect it | RSA | October 6 2020
The invisible risk | IT Security Guru | 23 September 2020
The Seven Dimensions of Security Culture: Attitudes | KnowBe4 | 20 August 2020
Is the Security Department a Barrier for Progression or are they Misunderstood? | Infosecurity Magazine | 19 August 2020
Are Account Takeovers Driving Towards a Passwordless Future? | KnowBe4 | 28 July 2020
When data manipulates you | TEISS | 9 July 2020
What Furlough means for cybersecurity | Think Digital Partners | 6 July 2020
How Local Authorities Can Combat Security Risks With Cyber Training | Trustmarque | 6 July 2020
The Challenge of Third-Party Compliance Management | Infosecurity Magazine | 2 July 2020
Why isn’t my security awareness campaign working? | SBL | 24 June 2020
The face of APT actors | KnowBe4 | 18 June 2020
Furloughed workers : Threats, anxiety, and staying away from work | KnowBe4 | 9 June 2020
Overcoming the security culture hurdle for the modern-day security leader | IT PRo Portal | 5 June 2020
How Low Can They Go? | KnowBe4 | 2 June 2020
Money from Crude Data | Security Info Watch | 28 May 2020
7 Steps to unleashing the creative hacker within | Technative | 27 May 2020
Explain Encryption to me | IT Security Guru |12 May 2020
Is being technical the most desired trait for a CISO? | SC Magazine | 12 May 2020
We’re all third-party management orgs | KnowBe4 | 5 May 2020
7 tips to optimise security | TEISS | 14 April 2020
Removing Zoom Meeting ID’s: Treating the Symptom, Not the Cause | KnowBe4 | 10 April 2020
Simulating COVID-19 Phishing Emails | Infosecurity Magazine | 8 April 2020
Seven tips to optimize security | KnowBe4 | 7 April 2020
Explain encryption to me | (ISC)2 | 2 April 2020
A technical risk assessment of COVID-19 | IT Security Guru | 1 April 2020
An Uber Phish | KnowBe4 | 31 March 2020
How to assess and prioritize insider threat risk | Tech Target | 30 March 2020
The Paradox of Perfection | KnowBe4 | 27 March 2020
Inception: Your Employee’s Mind is the Scene of the Crime | KnowBe4 | 26 March 2020
The real insider threat is the use of security software | Techradar Pro | 23 March 2020
Cybersecurity in financial services | Global & Banking Finance | 19 March 2020
The Most Important Thing When Working From Home | KnowBe4 | 16 March 2020
The RSA Survival Guide | IT Security Guru | 21 February 2020
Marry, date, or dump your security tech | Tech Aeris | 13 February 2020
Happy hotel with a sad ending | KnowBe4 | 15 January 2020
The Seven Real Security Predictions | Infosecurity Magazine | 8 January 2020

Dancing with Hackers | KnowBe4 | 19 December 2019
Microsoft Sees Phishing on the Rise | KnowBe4 | 11 December 2019
Using Threat Intelligence to build data-driven defence | Intelligence CISO | 3 December 2019
Year in Review: Security Awareness | Infosecurity Magazine | 2 December 2019
Don’t worry about Ransomware | KnowBe4 | 18 November 2019
Nudging Towards a Secure World | Infosecurity magazine | 16 October 2019
What Footballers Wives Can Teach Us About Cybersecurity | KnowBe4 | 15 October 2019
Security Awareness for the Masses | Infosecurity Magazine | 25 September 2019
Gambling on cybersecurity | EGR | 12 September 2019
Shocking Ransomware Leaves Johannesburg Residents Without Electricity | Popcorn Training | 29 July 2019
How to Avoid being the next organisation to be harpooned by phishing | Global Banking & Finance | 11 July 2019
HowTo Enable Effective Security Awareness Training | Infosecurity Magazine | 7 June 2019
Taking Security Seriously | Infosecurity Magazine | 24 May 2019
Security through transparency | AlienVault | 23 April 2019
Hope for the Best, Plan for the Worst | MSSP Alert | 29 March 2010
RSA 2019 – A Case of the Blues | AlienVault | 15 March 2019
SIEM platforms come of age in raging battle against cybercrime | TEISS | 24 February 2019
Securing People | AlienVault | 20 February 2019
Security Have and Have-Nots | Cyber Defense Magazine | 4 February 2019
Ways to Respond to a Breach | AlienVault | 29 January 2019
How to Be an InfoSec Thought Leader | AlienVault | 24 January 2019

The REAL 2019 Cyber Security Predictions | AlienVault | 13 December 2018
Protecting the Wrong Things | AlienVault | 5 December 2018
Let’s Talk about Segregation of Duties | AlienVault | 20 November 2018
Spicing up the MSSP World | AlienVault | 29 October 2019
Why Spending More On Security Isn’t The Answer | AlienVault | 23 October 2018
Data breaches and the blame game | TEISS | 13 September 2018
Cyber Security Awareness Month – Phishing | AlienVault | 4 September 2018
The Black Hat Recap | AlienVault | 13 August 2018
Hope for the Best, Plan for the Worst | AlienVault | 30 July 2018
Cyber resilience: Why hoping for the best & planning for the worst is the new norm | SC Magazine | 25 July 2018
15 Ways to Deal with Badly Written Risks | AlienVault | 9 July 2019
Cloud Based Security | AlienVault | 3 July 2018
Preventing the Cloud from Becoming a Digital Dumping Ground | Infosecurity Magazine | 8 May 2018
How the Cybersecurity skills gap is changing the way we work | TEISS 8 May 2018
Let’s be Fools | AlienVault | 19 April 2018
Five ways you could get your company into trouble without realising it | IT Pro Portal | 16 April 2018
How to do More With Less in Cybersecurity | Infosecurity Magazine | 13 April 2018
Life of a Worm | AlienVault | 11 April 2018
780 Days in the Life of a Computer Worm | Dark Reading | 27 March 2018
Information security misconceptions | CSO Online | 20 March 2018
An Interview with Graham Cluley | AlienVault | 7 March 2018
Overcoming data overload in cyber-security | SC Magazine | 6 March 2018
If time is money, what exactly is data? | CSO Online | 7 February 2018
Mental Models & Security: Thinking Like a Hacker | Dark Reading | 16 January 2018
I Am Dave | AlienVault | 2 January 2018

It’s not your parents’ SIEM | CSO Online | 12 December 2017
Real Editor Meets Guest Editor: Q&A with Javvad Malik | Infosecurity Magazine | 12 December 2017
Guest Editor: Let’s Talk About Data Breaches | Infosecurity Magazine | 12 December 2017
The Impact of NotPetya and WannaCry | AlienVault | 11 December 2017
Six Cybersecurity Predictions for The Year Ahead | AlienVault | 7 December 2017
5 Retail Security Tips: Don’t Let Hackers Ruin the Holiday Season | AlienVault | 24 November 2017
Jeremiah Grossman: On InfoSec Basics, Incentives, and Warranties | AlienVault | 22 November 2017
When the going gets tough, security gets serious | SC Magazine | 21 November 2018
BSides Lisbon and the Global Community | AlienVault | 16 November 2017
Steve Ragan: Writing for Impact | AlienVault | 15 November 2017
Be afraid of the dark web – or learn to monitor it | CSO Online | 31 October 2017
Halloween horrors and how to avoid falling victim | IT Pro Portal | 30 October 2017
Culture Eats Security for Lunch | AlienVault | 9 October 2017
How to Stay Safe Online – Tips for Regular Folks | AlienVault | 2 October 2017
If data is the new oil, then Equifax just caused a huge environmental disaster | CSO Online | 28 September 2017
A 9-step guide to prepare for GDPR compliance | Information Management | 21 September 2017
Cyber Attack Trends: Detection, Response, and Cure | Infosecurity Magazine | 5 September 2017
Putting the cyber in crime | CSO Online | 25 August 2017
Governments and Backdoors | AlienVault | 13 June 2017
Cutting through complexity in cloud security to increase visibility | SC Magazine | 1 June 2017
Nothing new to (Wanna)Cry about | CSO Online | 31 May 2017
Lucky Security | AlienVault | 25 May 2017
Innovation for the Sake of Innovation | AlienVault | 16 May 2017
Making Sense of WannaCry | AlienVault | 14 May 2017
What Got CISOs Here, Won’t Get CISOs There | AlienVault | 11 May 2017
The General Data Protection Regulation (GDPR) | AlienVault | 9 May 2017
Non-Security Tips for Security Professionals | Infosecurity Magazine | 3 May 2017
Is your company spending on the right security technologies? | CSO Online | 21 April 2017
Ten Data Centre Migration Pitfalls | AlienVault | 12 April 2017
Fool Me Once, Shame on You | AlienVault | 30 March 2017
Change is Automatic, Progress is Not | AlienVault | 15 March 2017
Well-funded doesn’t mean well-secured | CSO Online | 10 March 2017
Threats Converge: IoT Meets Ransomware | Dark Reading | 6 March 2017
Planning for an InfoSec Conference | AlienVault | 17 February 2017
Top 3 Considerations Before Buying a Security Product | AlienVault | 10 February 2017
IT Security Party Tricks | AlienVault | 1 February 2017
How to Hold on to Your Workforce During the Job Hunting Season | Infosecurity Magazine | 25 January 2017
The Internet Of Ransomware | Huffington Post | 19 January 2017
3 tips to improve threat detection and incident response | CSO Online | 18 January 2017
The Internet of Ransomware | AlienVault | 12 January 2017

The Fundamentals of SecOps that 2016 Forgot | AlienVault | 28 December 2016
What can we expect from cyber-security in 2017? | IT Pro Portal | 22 December 2016
Five ways cybersecurity is nothing like the way Hollywood portrays it | CSO Online | 15 December 2016
Money, Happiness, & Breaches: Views from Spiceworks IT Professionals | AlienVault | 13 December 2016
MELT Away Scams This Winter | Huffington Post | 9 December 2016
8 security tips for retailers and consumers this holiday season | CSO Online | 30 November 2016
Human behaviour in organisational security – Frontline defense or lost cause? | IT Pro Portal | 22 November 2016
IoT: Usability Dream or Privacy Nightmare? | AlienVault | 16 November 2016
Understanding the Mirai Threat on IoT – Open Letter to Manufacturers | AlienVault | 1 November 2016
The Mirai Botnet, Tip of the IoT Iceberg | AlienVault | 22 October 2016
Seven Tips For Optimizing Security | AlienVault | 19 October 2016
Vulnerability Scanning – Tip Tuesday for NCSAM | AlienVault | 18 October 2016
Overcoming Skill Gaps, Shortages, and Recruitment Challenges in InfoSec | AlienVault | 17 October 2016
Behavioral Monitoring – Tip Tuesday for NCSAM | AlienVault | 11 October 2016
Knowing Your Assets – Tip Tuesday for NCSAM | AlienVault | 4 October 2016
Ransomware Raises the Question: Establishing the Value of Data | AlienVault | 29 September 2016
Blackhat 2016: Threat Intelligence Déjà vu | AlienVault | 20 September 2016
Changing Business, and Risks of the Supply Chain | AlienVault | 8 September 2016
Overcoming risks in the digital supply chain | UK Tech News | 7 September 2016
Can You Explain Encryption to Me? | AlienVault | 22 August 2016
2016 Gartner Magic Quadrant for SIEM: A Visionary Feast | AlienVault | 11 August 2016
Naming Security | AlienVault | 7 July 2016
Clicking With The Enemy | AlienVault | 28 June 2016
Are Businesses Prepared for GDPR? | AlienVault | 14 June 2016
Infosecurity Europe 2016, a Recap | AlienVault | 11 June 2016
The Community of Extra-ordinary Aliens | AlienVault | 17 May 2016
Threat Intelligence Sharing: The Only Way to Combat Our Growing Skills Gap | Infosecurity Magazine | 11 May 2016
A Day in the Life of Darth-CISO: Happy Star Wars Day! | AlienVault | 4 May 2016
Open Source, the Community, and Aliens | AlienVault | 12 April 2016
Privacy, The Feds and Government Surveillance – RSA and Spiceworks Survey Results | AlienVault | 15 March 2016
One Change to Improve Security | AlienVault | 11 March 2016
Seven Alien Highlights From RSA 2016 | AlienVault | 4 March 2016
Writing Risk Statements in Infosec | AlienVault | 3 March 2016
7 Cyber Security Movies That Need to Be Made | AlienVault | 12 February 2016
Tweetchat roundup: Is Pop Culture Making Cybersecurity Sexy? | AlienVault | 9 February 2016
The 7 Strangest Places People Have Lost Data | AlienVault | 28 January 207
The Challenge of Retaining IT Security Skills – Blood on HR’s Floor | AlienVault | 27 January 2016

2015 SANS Analytics & Intelligence Survey | AlienVault | 12 November 2015
Questions are the answers | AlienVault | 11 November 2015
The toughest thing about working in IT | AlienVault | 4 October 2015
Disclosing Vulnerabilities, Using Data Dumps & Sharing Threat Intelligence | AlienVault | 29 September 2015
Black Hat 2015 – Recap | AlienVault | 10 August 2015
Black Hat 2015 – AlienVault Booth | AlienVault | 6 August 2015
2015 Gartner Magic Quadrant for SIEM: Visionary Aliens | AlienVault | 21 July 2015
Insider Threats Defined | AlienVault | 6 July 2015
Securing data in the cloud: What’s so different? Tweetchat Roundup! | AlienVault | 30 June 2015
Keep Calm and Snoop On | AlienVault | 9 June 2015
Talks, awards and high fives | AlienVault | 8 June 2015
Is Infosec Different in the UK Versus USA? | AlienVault | 3 June 205
The European Security Perspective | AlienVault | 1 June 2015
When Bad Things Happen in Good Software | AlienVault | 13 May 2015
Ethics, security, and getting the job done | AlienVault | 13 May 2015
50 Shades of Threat Intelligence | AlienVault | 4 May 2015
Climbing rocks, not ladders | AlienVault | 31 March 2015