Could retrospective analysis be a secret weapon against APTs?

Rapid digital transformation is most definitely creating vast new opportunities across Africa, but, at the same time, it’s also opening up a larger attack surface for threat actors to exploit. In this environment, one capability proving to be a game-changer for local...

Your WiFi router is about to start watching you

Imagine this: your WiFi router knows when you’ve fallen down the stairs, whether you’re having trouble breathing, and exactly how many times you’ve visited the loo today. By Paul Colmer, executive committee member of WAPA It can also detect when your...

What businesses should be doing instead of buying more tech

A year after law enforcement paraded the takedown of LockBit as a victory for cybersecurity, the harsh reality has set in: ransomware didn’t retreat – it metastasised. The criminals didn’t stop; they just got smarter, writes John Mc Loughlin, CEO of J2 Software....

The rise of the shadow employee

Imagine a marketing manager who left a company six months ago, taking their personal laptop with them. On it, unbeknownst to anyone, was a cached login to a shared cloud drive containing sensitive client proposals and campaign strategies – access that was simply...

An enterprise security perspective on skipping software updates

Is the humble software update the unsung hero of modern enterprise security? It certainly doesn’t get the attention it deserves. By Valencia Karageorgiades, Technology Architect at SAP Africa  Modern security teams are consumed with identity and access management,...