Cloud security demands a smarter, managed approach
As more businesses move their operations to the cloud, securing these environments has become a strategic imperative. By Ryan Boyes, governance, risk and compliance officer at Galix Fortinet’s 2025 report reveals that 35% of IT security budgets are now dedicated to...
Your old hardware could be your most expensive cyber threat
Too many organisations treat secure IT disposal as an afterthought. Once a laptop or hard drive is no longer in use, it’s often left to gather dust or sent to recycling without proper data wiping. That’s a major risk. Sensitive information doesn’t disappear when a...
Visibility that drives real resilience
Strong cybersecurity begins with the ability to see everything, writes Roy Alves, sales director of J2. Visibility starts with a real time view of the client’s entire digital estate across endpoints, networks, cloud and hybrid environments. This approach relies on...
Why we have to let (the right) AI into our emails
With artificial intelligence (AI) now augmenting up to 80% of phishing emails and cybercriminals constantly upping their games, relying on employee training alone is both insufficient and damaging. To manage human risk effectively in this new landscape, organisations...
Why human error is our biggest cyber threat
Cyber-attacks are getting smarter, faster and more personal, and even the best security technology can’t stop them if people keep clicking on the wrong links. Craig Freer, director of managed services provider Qwerti, says businesses are fighting a new kind of battle,...
SA’s silent APP fraud time bomb
We made payments fast. Fraudsters said thank you. By Tim Chadwick, CEO of Chadwicks South Africa is racing into real time payments, PayShap IDs, instant EFTs, money that leaves in seconds. That is good for cash flow and great for crooks. The hottest scam in the world...
The desperation effect: How financial anxiety makes you click the scam link
The narrative of cybersecurity risk often revolves around sophisticated hacking tools or zero-day vulnerabilities. Yet, the most significant threat to South Africans isn't a technical flaw – it's an emotional vulnerability rooted in a national financial crisis. The...
AI won’t save you from cyberattacks without discipline
As organisations race to modernise their digital operations, many still harbour the belief that more tools, more dashboards, and more AI will automatically make them more secure. According to Sasha Slankamenac, architect in the office of the chief technology officer...
SA kids caught in cybercrime crosshairs
With the festive season in full swing and schools soon closing for the year, children will be spending more time online than ever before. From gaming and social media to videos and virtual hangouts, the digital world offers endless distractions. As parents juggle work...
Built by hackers, cybersecurity academy aims to close the skills gap
Over 2 000 cybersecurity incidents are said to be reported to Information Regulator over the past year. But, according to experts, the actual number of threats impacting South African companies is more likely to be in the realm of 2 000 per week. It is estimated that...
Check Point debuts Quantum Firewall Software R82.10
Check Point Software Technologies has announced its new Check Point Quantum Firewall Software, R82.10, introducing 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments and simplify Zero Trust across hybrid networks. “As...
Securing the smart fleet: Protecting SA’s logistics sector
Contributing around 10% to 12% of South Africa’s GDP, the transport and logistics sector supports almost every part of the country’s economic activity. By Doros Hadjizenonos, regional director: southern Africa at Fortinet Every item that reaches a store shelf, factory...