Nov 13, 2025
As businesses move beyond traditional network boundaries, the old “castle and moat” model of security is no longer effective. In a world of hybrid work, cloud platforms and mobile devices, implicit trust within a network is a major vulnerability. By Ivaan Captieux,...
Nov 11, 2025
Digital hoarding poses a significant and often underestimated cybersecurity risk that extends far beyond a simple productivity issue, argues Anna Collard, senior vice-president of content strategy and CISO advisor at KnowBe4 Africa. Like a garage slowly filling with...
Nov 7, 2025
The conversation about artificial intelligence in South Africa has shifted rapidly over the past year. By Boland Lithebe, security lead for Accenture, Africa What was once the stuff of conferences and pilot projects is now quietly embedding itself in boardrooms and...
Nov 7, 2025
Attack surface management (ASM) has grown exponentially in recent years, evolving into a recognised market category that equips businesses with the strategies and visibility needed to protect their digital assets. By Kyle Pillay, security as a service manager at...
Nov 7, 2025
Cybercriminals are not only using fear and urgency to exploit their victims. Positive emotions – such as empathy, curiosity, and a desire to help – are also being exploited. This is the warning from Anna Collard, senior vice-president: content strategy and CISO...
Nov 7, 2025
Artificial intelligence (AI) is transforming how organisations innovate, serve customers, and operate at scale. By Avinash Gupta, head of Centre of Excellence at In2IT Technologies But when these workloads stretch across multiple cloud providers, complexity rises...