Preparedness is a competitive advantage in cybersecurity

In 2025, several prominent South African companies faced the all-too-common reality of a cyberattack. Some took days to respond, with their systems offline and reputations on the line. Others, though fewer in number, recovered quickly, communicated clearly, and...

Could retrospective analysis be a secret weapon against APTs?

Rapid digital transformation is most definitely creating vast new opportunities across Africa, but, at the same time, it’s also opening up a larger attack surface for threat actors to exploit. In this environment, one capability proving to be a game-changer for local...

Your WiFi router is about to start watching you

Imagine this: your WiFi router knows when you’ve fallen down the stairs, whether you’re having trouble breathing, and exactly how many times you’ve visited the loo today. By Paul Colmer, executive committee member of WAPA It can also detect when your...

What businesses should be doing instead of buying more tech

A year after law enforcement paraded the takedown of LockBit as a victory for cybersecurity, the harsh reality has set in: ransomware didn’t retreat – it metastasised. The criminals didn’t stop; they just got smarter, writes John Mc Loughlin, CEO of J2 Software....

The rise of the shadow employee

Imagine a marketing manager who left a company six months ago, taking their personal laptop with them. On it, unbeknownst to anyone, was a cached login to a shared cloud drive containing sensitive client proposals and campaign strategies – access that was simply...