Cybersecurity trends and adoption in Africa
As digital transformation accelerates across Africa and South Africa, cybersecurity has become a critical concern for governments, businesses, and individuals. The growing adoption of new technologies and the evolving sophistication of cyber threats necessitate...
Quantum leap or quantum risk?
The emergence of quantum computing represents a transformative shift in technology, promising unparalleled computational power while posing significant risks, particularly cybersecurity. By Amritesh Anand, vice-president and MD: technology services group at In2IT...
Commvault automates Active Directory forest recovery
Commvault has expanded its platform to provide full and automated forest recovery for Microsoft Active Directory. As organisations continue to combat non-stop cyberattacks and threats, Commvault Cloud Backup & Recovery for Active Directory Enterprise Edition is...
Cisco secures enterprise AI transformation
Cisco has announced Cisco AI Defense to enable and safeguard AI transformation within enterprises. As AI technology advances, new safety concerns and security threats are emerging at an unprecedented speed which existing security solutions are unprepared to protect...
These are the main business headaches related to IT security
According to the recent Kaspersky IT Security Economics report, the majority of companies surveyed globally find the loss of productivity, securing complex tech environments, and enabling data protection to be the most concerning business issues, driven by growing IT...
Kaspersky signs EC’s AI Pact on trustworthy AI use
Advocating for the secure use of AI technologies, Kaspersky has signed the AI Pact, a European Commission initiative that aims to prepare organisations for the implementation of the AI Act – the first ever comprehensive legal framework on AI worldwide, adopted by the...
Can we really fight AI cybersecurity threats with more AI?
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry, but a pressing global concern, writes Lisa Strydom, senior...
Don’t let phishing emails steal your data
Email has become an integral part of daily life, but it’s also a prime channel for cybercriminals. Phishing scams – malicious emails designed to trick recipients into revealing sensitive information – are among the most prevalent threats. In South Africa, where...
How to safeguard against cybercrime
South Africa is a growing cybercrime hotspot on the African continent, with attacks on businesses becoming more common as well as increasingly sophisticated. Karen Rimmer, head of distribution at PSG Insure, highlights that the consequences of cybercrime can be...
Trust no-one: Making sense of zero trust for your business
Protecting small and medium-sized enterprises (SMEs) from cyber threats goes beyond traditional firewalls. A zero-trust approach is now essential, offering enhanced security against insider threats and risks associated with remote work. Despite the initial investment,...
35 years on, is ransomware still effective?
Ransomware has been around for 35 years, with the first known case involving the AIDS Trojan. This malware was spread using physical disks, pretending to be software to assess people’s risk of developing AIDS. Since then, ransomware has become a major cyber threat,...
Top cyber security controls for SMEs
There are a multitude of cyber security controls that businesses can implement and leverage to protect against cyber threats, but we’ve selected five of the best that are ideal specifically for SMEs. In today’s digital, data-driven economy, cyber security is the...