Oct 13, 2025
The use of social media at work – especially on devices connected to internal networks – is putting South African businesses at risk of data breaches and cyberattacks. With no specific laws governing social media use in the workplace, many businesses operate without...
Oct 8, 2025
Penetration testing is a cornerstone of any effective cybersecurity strategy – it reveals critical system weaknesses and vulnerabilities, enabling them to be fixed before they can be exploited. By Nemanja Krstić, operations manager: managed security services at Galix...
Oct 5, 2025
There has never been an infrastructure project that has ever been delivered without risk and uncertainty. All projects have a level of risk which engineers are well trained to anticipate, manage, and mitigate. By Sthembile Mnengela, technical director of Zutari Risk...
Oct 2, 2025
More customers are arriving at meetings with financial plans created by generative artificial intelligence (AI), believing they have already mapped out their financial journey from start to finish. But beneath the neat spreadsheets and projections lie gaps:...
Sep 29, 2025
In April 2022, heavy rains caused catastrophic flooding in KwaZulu-Natal, claiming over 400 lives and damaging infrastructure, businesses, and homes. The eThekwini Municipality infrastructure damage cost about R25-billion. The disaster exposed vulnerabilities in...
Sep 29, 2025
In today’s fast-paced digital world, small businesses are just as susceptible to data breaches as large enterprises – if not more so. By Dillon Gray, chief operating officer at IPT The rise of AI tools, particularly generative AI, has added new layers of...