What is fileless malware?

Fileless malware has become a significant threat, and what makes this kind of malware particularly nasty is how difficult it is to detect. By Indi Siriniwasa, vice-president of Trend Micro SSA Because these attacks are so sneaky and hard to find, it makes the malware...

Why the CIOs/CISO positions is becoming more challenging

CIOs and CISO’s across industries are regularly moving between positions and companies because of this common mistake, writes Pieter Engelbrecht, Aruba BU manager for sub-Saharan Africa. It’s your worst possible nightmare. A hacker has breached the...

Email security essential in the digital age

A relationship that began many years ago with the migration of the Syrex secure email gateway services to Mimecast has evolved into a partnership for the future as companies need to become increasingly cyber resilient to protect themselves against malicious email...

Scams and flaws: why we get duped

Con artists have been plying their trade since time immemorial, but the internet opened the floodgates to a whole new level of swindling. It has allowed fraudsters to take aim at an endless number of victims and at the range of victims that they never could have...

Before you give into ransom demands …

Despite small and medium enterprises (SMEs) becoming increasingly popular targets for cybercriminals, many remain completely unprotected in this regard. As a result, when faced with a ransomware attack, there is often a lack of preparation and awareness around the...

Recognise and prevent modern cyber scams

When it comes to protecting yourself and your organization against cyber scams, there’s no “one-size-fits-all” solution. By Doros Hadjizenonos, regional sales director at Fortinet in South Africa As organisations and people alike continue to adopt...