Aug 28, 2025
Traditional cybersecurity and compliance training can be dull as dishwater, which can lead to poor engagement and low retention among employees. Gamification, if done well, offers a refreshing alternative, transforming boring modules into interactive experiences that...
Aug 26, 2025
Advanced persistent threats (APTs) don’t crash into networks with noise – they slip in silently, lie in wait, and stay there for months or even years. Their goal isn’t quick disruption or petty theft, but prolonged, covert access that allows them to spy, steal, and...
Aug 25, 2025
In 2025, several prominent South African companies faced the all-too-common reality of a cyberattack. Some took days to respond, with their systems offline and reputations on the line. Others, though fewer in number, recovered quickly, communicated clearly, and...
Aug 22, 2025
Rapid digital transformation is most definitely creating vast new opportunities across Africa, but, at the same time, it’s also opening up a larger attack surface for threat actors to exploit. In this environment, one capability proving to be a game-changer for local...
Aug 21, 2025
Imagine this: your WiFi router knows when you’ve fallen down the stairs, whether you’re having trouble breathing, and exactly how many times you’ve visited the loo today. By Paul Colmer, executive committee member of WAPA It can also detect when your...
Aug 19, 2025
A year after law enforcement paraded the takedown of LockBit as a victory for cybersecurity, the harsh reality has set in: ransomware didn’t retreat – it metastasised. The criminals didn’t stop; they just got smarter, writes John Mc Loughlin, CEO of J2 Software....