What you need to know about deploying AI to your security stack

Is there any single technology burdened with more hype than artificial intelligence (AI)? Bb Brian Pinnock, vice-president: sales engineering EMEA at Mimeast I recently chatted to author and technologist Mo Gawdat about his book Scary Smart. In our discussion the...

How ransomware has evolved

In the most recent edition of its annual Security Report, Check Point Software Technologies looked back on a tumultuous year in cybersecurity, which saw attack levels reach an all-time high in response to the Russia-Ukraine conflict. But what can we expect in the...

Public sector must respond to online threats in real time

Despite its various structural challenges, the South African economy continues to grow. Over time, this resilience and further potential for growth has attracted the attention of global cyber criminals. In this article, Trellix SA country lead Carlo Bolzonello argues...

What AI means for digital security

As AI technology like ChatGPT evolves, so do the strategies and tactics used by cybercriminals. Steve Flynn, sales and marketing director at ESET Southern Africa, says ongoing awareness is crucial in understanding how to manage potential cybersecurity challenges posed...

Why strong, unique passwords are important

Cyberattacks and data breaches are becoming alarmingly common. Most attacks and breaches have one thing in common: victims were using weak passwords. In a digital world, it is more important than ever to ensure your online accounts are protected by strong and secure...

For complex security landscape, best practices can be simple

Last year, Gartner identified the expanding attack surface due to remote work as one of the top concerning security trends. This leaves organisations more vulnerable to attacks and makes security more complex. Following network security best practice is crucial in...