What level of cybersecurity maturity are you?

What level of cybersecurity maturity are you?

As cyberattacks reach unprecedented levels, Chief Information Security Officers (CISOs) are increasingly burdened with the responsibility of safeguarding their organisations. By Graham Brown, country manager for SA/SADC at Commvault Recent research indicates that the...

The hidden cost of convenience

In light of Data Privacy Day last week, Kaspersky examines on the often-overlooked privacy trade-offs involved with using popular, everyday apps. These include social media apps, but also others such as e-commerce apps, fitness and health tracking apps. While these...

The role of data in modern business security

If data sits at the heart of the business, then observability is the game changer that transforms that data into value and security efficiency, writes Cameron Losco, GM: cybersecurity at DR Insight. The global data observability market is expected to grow at a...
Human risk, AI, governance top cyber risks

Human risk, AI, governance top cyber risks

As advancements in artificial intelligence (AI) and other new technologies evolve, cyber threats have become increasingly complex. Mimecast has unveiled its top cybersecurity predictions for 2025, identifying three critical areas of focus – Human Risk,...

How to survive – and learn from – a cyberattack

A recent study by South African cybersecurity firm Nclose revealed a sobering statistic: over 60% of businesses surveyed suffered at least one ransomware attack in the past two years, with 12% enduring six or more such attacks. By Javvad Malik, lead security awareness...
Security Janus: two faces of DCAP systems

Security Janus: two faces of DCAP systems

Sergio Bertoni, leading analyst at SearchInform, unpacks what DCAP systems are, and how they can be used to protect data.   DCAP for dummies On the one hand, various DCP/DAG systems aren’t magic unicorns. A lot of companies use them on the daily basis. The first...