The invisible workforce: why household apps have their own digital IDs

Most people understand what it means to protect a human identity because the dangers of someone impersonating you online or stealing and cloning your card are immediately obvious. By Richard Ford, Group chief technology officer of Integrity360 Today, organisations...

Man in the middle – the silent threat hiding in encrypted traffic

For most South Africans, the padlock in a browser bar feels like a seal of trust. It’s a comforting sign that says, “Your connection is secure”. But in the digital age, that confidence can be dangerously misplaced, writes Saurabh Prasad, senior solution architect at...

Rising to the era of AI-powered cyber defenve

The world of cybersecurity has fundamentally changed writes Anthony Grieco, senior vice-president and chief security & trust Officer at Cisco. Today, I’m proud to share that Cisco is joining the world’s most critical cyber defenders to...

Identity under siege: The new order of security in 2026

Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity, writes Caesar Tonkin, MD of Armata...

Architecting security in fintech: It’s in the whiteboard details

African organisations face an average of 3 153 cyberattacks a week, which is around 60% higher than the global average. The continent is sitting right in the proverbial thick of the threats, with fraud and attacks costing companies thousands. The African financial...

The future of PC security is multi-layered and managed

Twenty years ago, enterprise security was straightforward in that enterprise devices never left the premises. By Werner Joubert, commercial SYS business director (South Africa & SADC) at ASUS Perimeter security proved sufficient as business networks were...