What does a good cyber security incident response plan look like?

It doesn’t matter how large your organisation is, you are at risk. Sooner or later cyber criminals will try to attack you. It’s not a matter of whether your organisation will face a security incident, but rather when. That’s why a robust incident response...
Disrupt first, ask questions later

Disrupt first, ask questions later

Attackers don’t wait for board approval. They slip through a mis-configured firewall at 02:00 on a Sunday or phish a distracted employee just before quarter-end. By Ryno Le Roux, cyber operations manager at NEC XON At that moment, every control you’ve bought is judged...

AI’s growing influence in safeguarding banks and customers

Flashy artificial intelligence (AI) applications like generative art and self-driving cars might dominate today’s headlines. Ut ai and machine learning (ML) are playing a quiet background role in our lives, writes James Saunders, co-founder and chief technology...
Outdated systems are a hacker’s dream

Outdated systems are a hacker’s dream

Cybercrime is evolving faster than systems can keep up, so if your business is still sitting in the past, it’s sitting with vulnerabilities, writes Richard Frost, head of innovation and technology at Armata Cyber Security. According to the ‘Connected Business: digital...

Gesture-based IDV opens SA business to rising cyber crime

Purchasing gesture-based, low-cost identity verification (IDV) solutions to meet growing governance demands could put South African businesses at serious risk. This is according to Lance Fanaroff, co-founder of biometric identity provider iiDENTIFii. Awareness of...
When AI becomes the ultimate manipulator

When AI becomes the ultimate manipulator

Once the domain of elite spies and con artists, social engineering is now in the hands of anyone with an internet connection – and AI is the accomplice. Supercharged by generative tools and deepfake technology, today’s social engineering attacks are no longer sloppy...