Mar 2, 2026
The use of unapproved apps and systems inside an organisation, known as Shadow IT, is often viewed as a rebellious act by employees looking to break the rules. The reality is far more nuanced. Shadow IT is rarely malicious; it is usually a quite rational decision made...
Feb 24, 2026
An employee receives an email from a Gmail address asking for payslips. It feels routine, and without hesitation, the attachment is sent. Or the employee can pause, verify the sender, and confirm the request. This is just one of many similar moments that determine...
Feb 24, 2026
Almost all companies planning to establish a Security Operations Centre (SOC) regard artificial intelligence (AI) as a must-have component. However, despite high expectations, organisations face significant challenges in deploying and operationalising AI effectively....
Feb 23, 2026
South African CISOs are operating in a perfect storm. The rising volume and sophistication of attacks, constrained budgets, and a deepening skills shortage are adding to the mental strain of alert fatigue and the growing expectations from boards. While AI holds a...
Feb 20, 2026
AI didn’t storm in with board approval or a security checklist, writes By John Mc Loughlin, CEO of J2. It crept in unnoticed, drafting emails faster than you can read them, generating code on the fly, automating workflows behind the scenes, and empowering support...
Feb 19, 2026
As artificial intelligence continues its rapid move from experimentation into production environments, 2025 marked a turning point for how organisations approach AI adoption – particularly in the context of cybersecurity, governance and enterprise risk. According to...