Sophos announces Security Operations portfolio evolution
Sophos has announced significant enhancements to its Security Operations portfolio. In the months since the acquisition of Secureworks for $859-million, Sophos has made transformative progress, unifying technologies, expertise, and services from across its expanded...
When cyber laws backfire …
Regulation was designed to protect customers, curb risk, and hold businesses accountable. But today, it’s often doing the opposite - creating impossible trade-offs, punishing transparency, and turning defenders into accidental offenders. By John Mc Loughlin, CEO of ...
Early engagement matters for cybersecurity in digital transformation
Digital transformation is reshaping industries. Organisations are investing in cloud, AI, and data analytics to drive growth and agility. By Gilchrist Mushwana, partner and national head of cybersecurity at BDO South Africa Yet, cybersecurity is often brought in too...
Are enterprises truly prepared when ransomware strikes?
Over the past few months, a series of high-profile ransomware attacks have disrupted the operations of major organisations across sectors – from healthcare and manufacturing to public infrastructure and education. These incidents, though varied in scope and industry,...
CIMA launches 2025 Cybersecurity Tool
The Chartered Institute of Management Accountants (CIMA) has launched the latest version of its CGMA Cybersecurity Tool, designed to help finance professionals tackle the growing threat of cyberattacks through robust risk management, response, and remediation...
When likes become a liability …
The use of social media at work – especially on devices connected to internal networks – is putting South African businesses at risk of data breaches and cyberattacks. With no specific laws governing social media use in the workplace, many businesses operate without...
Five ways to outsmart cybercriminals
It often starts with something small: a WhatsApp from a number you don’t recognise, an email that looks like it’s from your bank, or a limited-time offer that seems too good to ignore. Within minutes, a single click or slip of the tongue can cost you thousands....
Make sure the boardroom doesn’t hold cybersecurity back
When it comes to cybersecurity, the role of the board has grown massively. By Martin Potgieter, regional chief technology officer at Integrity360 Viewing cybersecurity as a purely technical concern just isn’t viable. A board that is genuinely breach-ready can ensure...
Criminal networks exploit insider vulnerabilities
When you hear "insider threat” what comes to mind? A rogue employee stealing files before quitting? Think bigger, writes Heino Gevers, senior director of technical support at Mimecast. The reality is far more alarming. Today's insider threats aren't lone wolves acting...
‘Local frst’ data security is SA’s new digital fortress
The digital landscape is abuzz with discussions on threats, resilience, and the ever-evolving power of protection. Yet, amidst the global conversations, a distinct, powerful message is emerging from South Africa: the critical importance of a 'local first' approach to...
From deep to dark web: The supply chain fuelling cyberattacks
The dark web has transformed from a clandestine refuge for cybercriminals into a fully-fledged, sophisticated supply chain for cyberattacks, posing a direct and growing threat to South African organisations. This hidden segment of the internet now functions as a...
Kaspersky uses LLMs for training
A course developed by Kaspersky AI Technology Research Center aims to equip cybersecurity professionals with the essential skills to understand, evaluate and defend against vulnerabilities in large language models (LLMs). The advent of LLMs has revolutionised the way...