Continuous threat exposure management the new cybersecurity imperative
The old playbook of periodic vulnerability scans and annual security audits no longer suffices when attackers operate in real time, using automation and artificial intelligence (AI) to exploit the tiniest cracks in digital defences. By Saurabh Prasad, senior solution...
Top 10 cybersecurity trends and terrors of 2026
There is one word that describes cybersecurity right now, writes Jeanette Simpson, head of product management at Armata Cyber Security, and that’s ‘acceleration’. Attacks are scaling faster. Ransomware activity has increased 25% year-on-year and the number of...
Deepfake fraud escalates as detection technology enters SA
Certified AI Access, a South African AI trust and risk infrastructure company, and Reality Defender, a deepfake detection platform, today announced a partnership to deploy enterprise-grade deepfake detection technology across South Africa’s financial sector. The...
Costs, timelines and stumbling blocks: What it takes to build an SOC
For most organisations planning to build a Security Operations Center (SOC), the question is no longer whether to invest, but what it will take to make it operational. The findings of Kaspersky’s global study reveal that behind seemingly similar plans, companies face...
Rethinking antivirus in a modern security landscape
Antivirus has come a long way since its early signature-based roots, but even the most advanced versions cannot keep up with the speed and complexity of current cyber threats. By Ivaan Captieux, security consultant at Galix Attacks now bypass traditional controls...
Check Point accelerates secure AI data centre with Nvidia DSX Air
Check Point Software Technologies has announced the integration of its AI Factory Firewall and comprehensive AI security stack with Nvidia DSX Air, a cloud-based simulation and validation platform. The collaboration allows organisations to pre-validate security-aware...
Microsoft 365 security is a ticking time bomb
Across boardrooms and IT departments, a dangerous assumption continues to grow that because data resides in Microsoft 365 and Azure it is automatically secure, writes John Mc Loughlin CEO of J2 This belief is fundamentally flawed and creates a false sense of...
The real ROI of security: Moving beyond cost to performance
In South Africa, security is still widely viewed as a grudge purchase, a necessary expense rather than a strategic investment. Too often, buying decisions focus on upfront price, with the assumption that most security products offer similar protection. But the reality...
Ransomware is shifting targets – and many organisations are not prepared
Ransomware attacks are evolving rapidly, moving beyond the simple encryption of files to target the systems organisations rely on to recover from an attack. According to Phila May, executive GTM at inq. Digital, this shift is forcing technology leaders to rethink how...
MDR helps SA businesses stay ahead of attackers
At the start of 2024, a Hong Kong finance worker at a multinational firm joined what appeared to be a routine video call with senior leadership. The call included people who looked and sounded like the company's UK-based CFO and other executives, but they were...
Why digital trust matters for African SMEs
For years, security for SMEs across sub-Saharan Africa meant metal grilles and alarm systems. Today, the most significant risks are invisible and growing faster than most businesses realise, writes Andrew Bourne, regional head of Zoho South Africa. Artificial...
Why cybersecurity awareness is failing, and what to fix first
South African businesses are investing heavily in cybersecurity technology. Detection tools are becoming more sophisticated, monitoring is more advanced, and response capabilities are faster. Yet most breaches still begin with a human error, writes Charmé van der...