top of page
Secure Hybrid Identity™
Data and Risk Management
Search


You've been hacked! Now what?
What should you do if you discover your accounts or systems were hacked? Security breaches come in many forms, dictating the context of...

Brendan Kotze
Oct 2, 20234 min read
509 views
0 comments


Should you be worried about deepfake voices?
Did Emma Watson, the actor who portrayed Hermoine in the Harry Potter movies, record audio clips of her reading the controversial book...

Quentene Finnegan
Sep 18, 20233 min read
69 views
0 comments


Tips for a Security Incident Response Plan
How should one calculate the cost of a cybersecurity breach? Is it through brand and reputation damage, loss of important data, paying a...

Brendan Kotze
Sep 14, 20234 min read
116 views
0 comments


Incident Response: Your Company's ICU
When we are seriously ill, we seek medical care. If the situation is acute and dangerous, we go to the intensive care unit or ICU. The...

Guy Golan
Aug 10, 20233 min read
70 views
0 comments


AI's Disruption and Transformation of the Cybersecurity Landscape
Artificial Intelligence (AI) has been at the vanguard of this digital revolution, which has seen a spectacular spike in technical...

Performanta
Jul 27, 20233 min read
44 views
0 comments


Why treat DLP as a Business Tool?
Data Loss Prevention (DLP) protects critical information from being stolen or lost. Yet, without business input and ownership,...

Guy Golan
Jul 12, 20232 min read
74 views
0 comments


4 steps to secure your organisation
Connect with our experts to find out how we can help

Performanta
Jul 12, 20231 min read
30 views
0 comments


How to improve Office 365 security with Microsoft 365
Office 365 is one of the most widely used cloud-based productivity suites in the world. However, as with any cloud service, there are...

Matt Brunton
Apr 12, 20233 min read
85 views
0 comments


Lessons from the Linus Tech Tips hack
A big breach occurred recently, particularly if you are among the 15 million Youtube subscribers of Linus Tech Tips. This juggernaut...

Kian Jones
Mar 29, 20233 min read
53 views
0 comments


Is your Active Directory a gateway for cyber criminals?
Active Directory is still the access backbone of most enterprises. It is often the primary gateway to networks that connect all of a...

Matt Brunton
Mar 16, 20233 min read
53 views
0 comments


Phishing 101 – The 8 steps of an attacker
How do you fight an enemy that can attack you from a thousand different angles, armed to the teeth with sophisticated tools, and remain...

Brendan Kotze
Feb 27, 20233 min read
30 views
0 comments


The Hacker Playbook: Know your role in the war against the digital enemy
Cybersecurity is exposed to a vicious cycle: where innovation is born, risks quickly emerge. Naturally, it’s impossible to make progress...

Brendan Kotze
Feb 17, 20233 min read
144 views
0 comments


Future Cybersecurity Predictions
A compilation of the recent top cyber security statistics, facts and figures from across the industry, to help you keep abreast of the...

Performanta
Jan 20, 20231 min read
74 views
0 comments


The Uber CISO Trial Is A Warning For Security Leaders
By Guy Golan, CEO and co-founder of the Performanta Group It won't happen to me! Security professionals know this reaction—usually spoken...

Guy Golan
Dec 5, 20224 min read
56 views
0 comments


What’s the most popular attack surface for your everyday cyber-criminals?
In some ways, things haven’t changed: zero day compromises are still headline news. Last year, we saw numerous critical vulnerabilities...

Alastair Cox
Sep 21, 20223 min read
176 views
0 comments


The Possible Future of Cyber Threat Intelligence – The Avengers of Cyber Security
Cyber Threat Intelligence (CTI) has been a critical aide in the Cyber Security Landscape in the years since its inception. An industry...

Dylan Diggle
Sep 8, 20225 min read
104 views
0 comments


Cybersecurity is just a product. Cybersafety is what matters.
By Guy Golan, CEO and co-founder of the Performanta Group Every time I board a flight, I marvel at the complexity of what has become a...

Guy Golan
Sep 2, 20224 min read
174 views
0 comments


Azure Privileged Identity Management. Here’s why you need it.
Privileged Identity Management (PIM) is an Azure AD security component designed on the principles of just-in-time access for managing, monit

James Buchan
Aug 2, 20223 min read
1,245 views
0 comments


Azure AD Group Writeback
Microsoft has released a big update to its Azure AD group writeback feature. The most significant change is that security groups can now be

Chris Swales
Jul 25, 20225 min read
345 views
0 comments


Identity Management and the Cloud: Not a simple transition
The cloud dominates today's technology conversations. It is the new paradigm for flexibility, scale and cost management. As these...

Performanta
Jun 7, 20223 min read
69 views
0 comments
bottom of page