Why real emails now look fake

Why real emails now look fake

In the fight against phishing, forward-thinking organisations are winning. But there’s a twist. The heightened vigilance that has empowered employees to detect suspicious emails is now creating a new dilemma: legitimate, business-critical messages are being flagged,...

Is password-based security ending?

The password is no longer a fortress in and of itself. In a landscape where attackers effortlessly bypass traditional defences, passwords have become more of a revolving door to a greater security fortress – one that needs to be built on resilience, not strength. By...

How to outsmart AI scammers

Artificial intelligence (AI) is everywhere. And, as much as it’s changing the world in cool ways like music, art, gaming and technological advancements, scammers are using it too, to attempt to defraud you “Fraudsters are becoming more sophisticated, and scams aren’t...

Securing SA’s AI future: why cybersecurity must lead the way

Artificial intelligence is rapidly becoming the engine room of South Africa’s economic future, writes Boland Lithebe, security lead for Accenture, Africa. Across sectors, from banking and insurance to healthcare and retail, AI systems are transforming how decisions...

What does a good cyber security incident response plan look like?

It doesn’t matter how large your organisation is, you are at risk. Sooner or later cyber criminals will try to attack you. It’s not a matter of whether your organisation will face a security incident, but rather when. That’s why a robust incident response...
Disrupt first, ask questions later

Disrupt first, ask questions later

Attackers don’t wait for board approval. They slip through a mis-configured firewall at 02:00 on a Sunday or phish a distracted employee just before quarter-end. By Ryno Le Roux, cyber operations manager at NEC XON At that moment, every control you’ve bought is judged...