Zero trust begins with the right security partner

Zero trust begins with the right security partner

As businesses move beyond traditional network boundaries, the old “castle and moat” model of security is no longer effective. In a world of hybrid work, cloud platforms and mobile devices, implicit trust within a network is a major vulnerability. By Ivaan Captieux,...

Cluttered desktops are a cybersecurity nightmare

Digital hoarding poses a significant and often underestimated cybersecurity risk that extends far beyond a simple productivity issue, argues Anna Collard, senior vice-president of content strategy and CISO advisor at KnowBe4 Africa. Like a garage slowly filling with...
Securing AI agents through smarter ID management

Securing AI agents through smarter ID management

The conversation about artificial intelligence in South Africa has shifted rapidly over the past year. By Boland Lithebe, security lead for Accenture, Africa What was once the stuff of conferences and pilot projects is now quietly embedding itself in boardrooms and...
Why attack surface management must look both inside and out

Why attack surface management must look both inside and out

Attack surface management (ASM) has grown exponentially in recent years, evolving into a recognised market category that equips businesses with the strategies and visibility needed to protect their digital assets. By Kyle Pillay, security as a service manager at...

Cybercriminals exploit our best intentions

Cybercriminals are not only using fear and urgency to exploit their victims.  Positive emotions – such as empathy, curiosity, and a desire to help – are also being exploited. This is the warning from Anna Collard, senior vice-president: content strategy and CISO...
Multi-cloud AI security: finding order in the chaos

Multi-cloud AI security: finding order in the chaos

Artificial intelligence (AI) is transforming how organisations innovate, serve customers, and operate at scale. By Avinash Gupta, head of Centre of Excellence at In2IT Technologies But when these workloads stretch across multiple cloud providers, complexity rises...