AI and cybersecurity: Trust must come before scale
As artificial intelligence continues its rapid move from experimentation into production environments, 2025 marked a turning point for how organisations approach AI adoption – particularly in the context of cybersecurity, governance and enterprise risk. According to...
How SaaS supply chains became cybersecurity’s new weak link
Software-as-a-Service (SaaS) is no longer an IT choice; it’s the operating system of business itself. By Avinash Gupta, head of centre of excellence at In2IT Technologies From Salesforce to Workday, Microsoft 365 to Slack, the SaaS layer now underpins collaboration,...
How to spot and avoid cyber scams during the 2026 Winter Competitions
The 2026 Winter Olympic Games are in full swing, captivating sports fans worldwide. However, the Games also serve as an opportunity for scammers to strike with different kinds of cyber fraud. Kaspersky has identified some of the key scams targeting fans right now –...
AI in cybersecurity: battleground or breakthrough?
The rise of artificial intelligence (AI) has transformed industries from healthcare to finance, but one area where its influence is both promising and perilous is cybersecurity. By Avinash Gupta, head of Centre of Excellence at In2IT Technologies On one hand, AI...
Cyber resilience moves from IT issue to board risk
Cybersecurity has shifted decisively from an IT concern to a core business risk, and South African organisations are feeling this change acutely. By Boland Lithebe, security lead for Accenture, South Africa The World Economic Forum’s Global Cybersecurity Outlook 2026...
In cybersecurity, the when is just now
Cyber-risk in South Africa is not an if anymore, it’s when the attackers get in and how equipped the company is to deal with it, writes Mohammed Pochee, product manager: security at Vox. A company can very easily find itself offline for more than a week. Attackers can...
Facebook cloning turns your profile into a weapon
Facebook cloning scams are continuing to rise, turning ordinary profiles and family photos into tools for fraud and social engineering, writes Richard Frost, head of technology solutions and consulting at Armata Cyber Security. Have you ever wondered what criminals...
Rethinking wide-area surveillance for Africa
In Africa’s diverse and often unpredictable environments, surveillance systems face challenges that go far beyond simple camera placement. By Leandro da Cunha, surveillance BU executive at Duxbury Networking From sprawling industrial facilities and logistics hubs to...
A PCI DSS expert the best defence against fraud as a service
Cybercrime has undergone a structural shift. What was once a fragmented underground economy built around specialised skills has evolved into a scalable, on-demand commercial ecosystem. By Johannes Briel, senior cyber security specialist at Galix Today,...
Kaspersky launches OT calculator
Kaspersky’s new online tool has been specially developed for industrial organisations to assess the potential costs associated with insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management...
Extra protection needed for high-value data
As artificial intelligence (AI) accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent. This is according to...
Ransomware in 2025 and what to expect in 2026
The economic toll of ransomware could be staggering, writes Fabio Assolini, head of research centre: Americas and Europe, Global Research & Analysis Team at Kaspersky. VDC Research and Kaspersky conducted an estimation which showed that in the manufacturing sector...