What does a good cyber security incident response plan look like?
It doesn't matter how large your organisation is, you are at risk. Sooner or later cyber criminals will try to attack you. It’s not a matter of whether your organisation will face a security incident, but rather when. That's why a robust incident response plan is...

Disrupt first, ask questions later
Attackers don’t wait for board approval. They slip through a mis-configured firewall at 02:00 on a Sunday or phish a distracted employee just before quarter-end. By Ryno Le Roux, cyber operations manager at NEC XON At that moment, every control you’ve bought is judged...
AI’s growing influence in safeguarding banks and customers
Flashy artificial intelligence (AI) applications like generative art and self-driving cars might dominate today’s headlines. Ut ai and machine learning (ML) are playing a quiet background role in our lives, writes James Saunders, co-founder and chief technology...

Outdated systems are a hacker’s dream
Cybercrime is evolving faster than systems can keep up, so if your business is still sitting in the past, it’s sitting with vulnerabilities, writes Richard Frost, head of innovation and technology at Armata Cyber Security. According to the ‘Connected Business: digital...
Gesture-based IDV opens SA business to rising cyber crime
Purchasing gesture-based, low-cost identity verification (IDV) solutions to meet growing governance demands could put South African businesses at serious risk. This is according to Lance Fanaroff, co-founder of biometric identity provider iiDENTIFii. Awareness of...
Fraud warning about fake events
A new scam involving advertising fraudulent professional conferences or events using seemingly legitimate event invitations is becoming more prevalent. One such invitation included an agenda, registration details and purported to feature high-profile speakers from...
Trend secures AI infrastructure with Nvidia
Organisations worldwide are racing to implement agentic artificial intelligence (AI) solutions to drive innovation and competitive advantage. However, this revolution introduces security challenges - particularly for organisations in highly regulated industries that...
Kaspersky supports Interpol in curbing infostealer threat
Kaspersky has assisted Interpol in its latest operation Secure that focused on disrupting infostealer threat and taking down infrastructure hosting such malware. The operation has brought together law enforcement agencies from 26 participating countries and Interpol’s...
Secure the network with AI-powered single-vendor SASE
Troye has announced the general availability of HPE Aruba Networking’s AI-powered, single-vendor Secure Access Service Edge (SASE) solution. Secure Access Service Edge (SASE) is a cybersecurity and networking paradigm first coined by Gartner in August 2019. SASE...

When AI becomes the ultimate manipulator
Once the domain of elite spies and con artists, social engineering is now in the hands of anyone with an internet connection – and AI is the accomplice. Supercharged by generative tools and deepfake technology, today’s social engineering attacks are no longer sloppy...
SensePost offers developer-oriented security training
Orange Cyberdefence SensePost will be launching a new information security training course aimed at enriching software developers with security thinking. The SecDevOps course has been developed by penetration testers who test the security of applications, IT...
Deepfakes a growing threat to SA corporations
Artificial intelligence (AI) has now made it possible to wake up to a video of your CEO seemingly admitting to fraud or receiving an urgent audio message from your chief financial officer authorising a large, unexpected transaction, without any of it being real. By...