Make sure the boardroom doesn’t hold cybersecurity back

When it comes to cybersecurity, the role of the board has grown massively. By Martin Potgieter, regional chief technology officer at  Integrity360 Viewing cybersecurity as a purely technical concern just isn’t viable. A board that is genuinely breach-ready can ensure...

Criminal networks exploit insider vulnerabilities

When you hear “insider threat” what comes to mind? A rogue employee stealing files before quitting? Think bigger, writes Heino Gevers, senior director of technical support at Mimecast. The reality is far more alarming. Today’s insider threats aren’t...
‘Local frst’ data security is SA’s new digital fortress

‘Local frst’ data security is SA’s new digital fortress

The digital landscape is abuzz with discussions on threats, resilience, and the ever-evolving power of protection. Yet, amidst the global conversations, a distinct, powerful message is emerging from South Africa: the critical importance of a ‘local first’...

From deep to dark web: The supply chain fuelling cyberattacks

The dark web has transformed from a clandestine refuge for cybercriminals into a fully-fledged, sophisticated supply chain for cyberattacks, posing a direct and growing threat to South African organisations. This hidden segment of the internet now functions as a...

Escalating GenAI fraud forces SA banks to shift from identity to intent

Despite its history of resilience and globally recognised innovation, the eyewatering pace of cyber threat evolution, characterised by rapid mutation and increasing sophistication, is forcing South Africa’s banking sector to rethink its approach to security. In its...

Weak human firewalls expose businesses to AI-driven cyberattacks

As South Africa’s digital economy matures, so too does its exposure to cyberthreats, and the country is now among the top 10 most targeted regions for cyberattacks globally. However, local businesses remain dangerously underprepared, as leaders continue to...