Data protection is about more than just thwarting cyberattacks

The fact that ransomware and cyberattacks have become increasingly prevalent is common knowledge, and this has raised greater awareness of the need for effective data protection. By Kate Mollett, regional director of Commvault Africa However, ransomware and other data...

Hacktivism and the new age of cyber warfare

In the most recent edition of its annual Security Report, Check Point Software Technologies looked back on a tumultuous year in cybersecurity, with the boundaries between state cyber-operations and hacktivism becoming blurred as nation states act with a degree of...

I am the CEO; no, I am the CEO

One of the most successful cyber-attacks of 2022 is CEO fraud, also known as business email compromise (BEC). According to the FBI’s Internet Crime Complaint Centre 2021 report, this type of attack is one of the most profitable, and one that has seen a...

What you need to know about deploying AI to your security stack

Is there any single technology burdened with more hype than artificial intelligence (AI)? Bb Brian Pinnock, vice-president: sales engineering EMEA at Mimeast I recently chatted to author and technologist Mo Gawdat about his book Scary Smart. In our discussion the...

How ransomware has evolved

In the most recent edition of its annual Security Report, Check Point Software Technologies looked back on a tumultuous year in cybersecurity, which saw attack levels reach an all-time high in response to the Russia-Ukraine conflict. But what can we expect in the...

Public sector must respond to online threats in real time

Despite its various structural challenges, the South African economy continues to grow. Over time, this resilience and further potential for growth has attracted the attention of global cyber criminals. In this article, Trellix SA country lead Carlo Bolzonello argues...