The advantage of a trusted partner for security risk and compliance
In an increasingly digital world, businesses are faced with the dual challenges of navigating the complexity of cybersecurity best practices alongside a growing body of data privacy and governance legislation. Both these areas hinge on understanding and managing data...
Secure your business-critical processes in the cloud
African enterprises are transforming their operations through the accelerating adoption of cloud technologies. By David Yawalkar, global head: operational product marketing for RISE with SAP As companies continue to face disruption and a challenging operating...
Enjoy the convenience of digital payments – and stay safe
With more than 184-million people across Africa having embraced mobile money according to a GSMA report, and with Discovery Bank and Visa research showing an increasing popularity of contactless payments and digital wallets in South Africa, these solutions have become...
Addressing cyber security in renewables key for energy security
While renewable energy is a key component to achieving the world's net zero goals, the reality is that there is still work to do to ensure it can be relied upon as a secure energy source. With solar energy backed as one of the world's primary energy sources of the...
Embracing SSE can strengthen the business network
The network infrastructure ecosystem has grown in complexity since the normalisation of hybrid work. A distributed workforce has put pressure on security and technology teams to rethink how to safeguard company data and systems from compromise. By Warren Gordon,...
Prevent cyberattacks by ensuring staff are aware
Over the past few years, cybersecurity has gone from being a niche concern to something people think about on a day-to-day basis. By Suraj Tiwari, global head of information security at VFS Global Data misuse and breaches at major international organisations have cut...
Empowering the frontline is key to cybersecurity success
Cybersecurity threats are constantly evolving and becoming more sophisticated, requiring organisations to recognise that their employees are both their greatest asset and their greatest vulnerability. By Kumar Vaibhav, lead senior solution architect: cybersecurity at...
Phish, smish and pay: The high cost of security failure
Organisations want solutions that mitigate the growing security threat and elevate their security posture. They need a layered and intelligent approach to security capable of withstanding the threats. And there are a significant number of threats. In 2023, more than...
Phishing used to exploit digital wallets
As payment methods become more sophisticated, so are the cybercriminals who are exploiting consumers who are insufficiently informed about how digital wallets work. Fraudulent activity doesn't take advantage of any security deficiencies in the cards or wallets...
Is your CEO safe from whaling or spear phishing?
Most cyberattacks are opportunistic. Much like a mugging on a dark street, it doesn't matter who the victim is as long as the perpetrators gain something out of their crimes. However, a growing number of these attacks are designed to target specific people like CEOs,...
Data for ransom: Yours …
The highest number of data compromises tracked by the Identity Theft Resource Center (ITRC) was 1 860, impacting around 300-million people in 2021. Until 2023. The ITRC tracked 3,205 data compromises affecting 353,027,892 individuals at a 72% increase on 2021's...
Kaspersky releases free malware scanner for Linux
Cybercriminals aren't ignoring Linux-based devices, which becomes evident when looking at some of the recent examples of malware targeting this operating system: a Linux implant for the DinodasRAT malware -- also known as XDealer; or a backdoor in the Trojanised...