SA businesses underestimate cyber risks

A figure of 2 113 cyber security threats a week sounds daunting enough but, according to experts, this may only be a fraction of the total number impacting South African companies. In a July 2025 report, Check Point Software Technologies revealed the 2 000-plus figure...
Zero trust begins with the right security partner

Zero trust begins with the right security partner

As businesses move beyond traditional network boundaries, the old “castle and moat” model of security is no longer effective. In a world of hybrid work, cloud platforms and mobile devices, implicit trust within a network is a major vulnerability. By Ivaan Captieux,...

Cluttered desktops are a cybersecurity nightmare

Digital hoarding poses a significant and often underestimated cybersecurity risk that extends far beyond a simple productivity issue, argues Anna Collard, senior vice-president of content strategy and CISO advisor at KnowBe4 Africa. Like a garage slowly filling with...
Securing AI agents through smarter ID management

Securing AI agents through smarter ID management

The conversation about artificial intelligence in South Africa has shifted rapidly over the past year. By Boland Lithebe, security lead for Accenture, Africa What was once the stuff of conferences and pilot projects is now quietly embedding itself in boardrooms and...
Why attack surface management must look both inside and out

Why attack surface management must look both inside and out

Attack surface management (ASM) has grown exponentially in recent years, evolving into a recognised market category that equips businesses with the strategies and visibility needed to protect their digital assets. By Kyle Pillay, security as a service manager at...

Cybercriminals exploit our best intentions

Cybercriminals are not only using fear and urgency to exploit their victims.  Positive emotions – such as empathy, curiosity, and a desire to help – are also being exploited. This is the warning from Anna Collard, senior vice-president: content strategy and CISO...