Get the upper hand in the cybersecurity arms race

Cybersecurity is an integral part of modern business. It’s also constantly changing, evolving with the cyberthreats it is meant to combat. From being a solid defensive wall protecting an organisation’s digital assets, cybersecurity today is best imagined as a rapidly...
Cell-boosting technology can help protect SA businesses

Cell-boosting technology can help protect SA businesses

In 2023, South Africa saw a 22% increase in cyberattacks. It should therefore come as no surprise that revenue in the local cybersecurity market is projected to reach $628-million by the end of this year. This month, the country is celebrating Cybersecurity Awareness...
The strategic relevance of managed detection and response

The strategic relevance of managed detection and response

As cyber threats evolve, organisations recognise the value of proactive and managed security solutions, making managed detection and response (MDR) a strategic choice for many. This service is gaining traction for several reasons, writes Paul Stuttard, CEO of Duxbury...

Why you should amp up cybersecurity efforts this holiday season

During Cybersecurity Awareness Month, Trend Micro’s Zaheer Ebrahim, solutions architect Middle East and Africa, takes a closer look at one of the most vulnerable times of year for cyber-attacks – the upcoming festive season It’s safe to say October is officially the...
We need to bridge the cybersecurity skills gap

We need to bridge the cybersecurity skills gap

Cybersecurity Awareness Month highlights the increasing cyber threats that organisations face daily, underscoring the growing shortage of cybersecurity professionals – a significant challenge for South African businesses. With a global deficit of nearly 4-million...

How to navigate the perils of cyber extortion

Cyber extortion has evolved into a complex and sophisticated form of cybercrime. Unlike traditional ransomware, which is typically computer-generated, broad, and indiscriminate in approach, cyber extortionists usually target specific companies for valuable data and...