The rise of the shadow employee

Imagine a marketing manager who left a company six months ago, taking their personal laptop with them. On it, unbeknownst to anyone, was a cached login to a shared cloud drive containing sensitive client proposals and campaign strategies – access that was simply...

An enterprise security perspective on skipping software updates

Is the humble software update the unsung hero of modern enterprise security? It certainly doesn’t get the attention it deserves. By Valencia Karageorgiades, Technology Architect at SAP Africa  Modern security teams are consumed with identity and access management,...

Cybersecurity training is the smartest investment you can make

In an age where data breaches, ransomware attacks, and phishing scams are daily threats, businesses can no longer afford to view cybersecurity training as a checkbox exercise. Instead, it should be regarded as a strategic investment with measurable returns. But how...

As quantum cybersecurity threats loom, go back to basics

Despite the escalating sophistication of AI-generated threats and the looming specter of quantum computing capable of shattering current encryption, the organisations staying ahead of the curve are those getting the fundamentals of cybersecurity hygiene right. By...

Top quantum computing risks

Kaspersky is addressing one of the most debatable technological challenges of the coming decade: the rise of quantum computing and its potential impact on digital security. In this context, experts have identified the main quantum threats that demand immediate action...