Hacktivism and the new age of cyber warfare

In the most recent edition of its annual Security Report, Check Point Software Technologies looked back on a tumultuous year in cybersecurity, with the boundaries between state cyber-operations and hacktivism becoming blurred as nation states act with a degree of...

I am the CEO; no, I am the CEO

One of the most successful cyber-attacks of 2022 is CEO fraud, also known as business email compromise (BEC). According to the FBI’s Internet Crime Complaint Centre 2021 report, this type of attack is one of the most profitable, and one that has seen a...

What you need to know about deploying AI to your security stack

Is there any single technology burdened with more hype than artificial intelligence (AI)? Bb Brian Pinnock, vice-president: sales engineering EMEA at Mimeast I recently chatted to author and technologist Mo Gawdat about his book Scary Smart. In our discussion the...

How ransomware has evolved

In the most recent edition of its annual Security Report, Check Point Software Technologies looked back on a tumultuous year in cybersecurity, which saw attack levels reach an all-time high in response to the Russia-Ukraine conflict. But what can we expect in the...

Public sector must respond to online threats in real time

Despite its various structural challenges, the South African economy continues to grow. Over time, this resilience and further potential for growth has attracted the attention of global cyber criminals. In this article, Trellix SA country lead Carlo Bolzonello argues...

What AI means for digital security

As AI technology like ChatGPT evolves, so do the strategies and tactics used by cybercriminals. Steve Flynn, sales and marketing director at ESET Southern Africa, says ongoing awareness is crucial in understanding how to manage potential cybersecurity challenges posed...