<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

How the SME can become the enterprise’s most secure asset

The enterprise Goliath is worried about their suppliers, writes Lucas Molefe, cybersecurity expert at ESET Southern Africa. These SMEs are underprepared and disproportionately targeted, with 43% of cyber-attacks directed at their digital front door. Added to this,...

Africa could leapfrog legacy cybersecurity models

South African organisations - particularly those responsible for critical infrastructure - need to rethink their reliance on legacy “trusted network” approaches. “It’s a major systemic risk,” says Armand Kruger, head of cybersecurity at NEC XON. However, the fact that...

The case for treating cybersecurity as a corporate sustainability metric

ESG discussions in South African boards generally default to carbon, community impact and governance process. While those remain essential, they don’t tell the full story of organisational sustainability, writes Richard Ford, group chief technology officer of...

AI, global uncertainty to top talks at Southern Africa’s leading cyber security event

Geopolitical uncertainty and AI’s impact on the security landscape are expected to top the agenda when over 1,000 cyber security stakeholders gather for the annual ITWeb Security Summit in Johannesburg next month. The ITWeb Security Summit, renowned as the must-attend...

When cyber laws backfire …

Regulation was designed to protect customers, curb risk, and hold businesses accountable. But today, it’s often doing the opposite - creating impossible trade-offs, punishing transparency, and turning defenders into accidental offenders. By John Mc Loughlin, CEO of ...

read more

CIMA launches 2025 Cybersecurity Tool 

The Chartered Institute of Management Accountants (CIMA) has launched the latest version of its CGMA Cybersecurity Tool, designed to help finance professionals tackle the growing threat of cyberattacks through robust risk management, response, and remediation...

read more
When likes become a liability …

When likes become a liability …

The use of social media at work – especially on devices connected to internal networks – is putting South African businesses at risk of data breaches and cyberattacks. With no specific laws governing social media use in the workplace, many businesses operate without...

read more

Five ways to outsmart cybercriminals

It often starts with something small: a WhatsApp from a number you don’t recognise, an email that looks like it’s from your bank, or a limited-time offer that seems too good to ignore. Within minutes, a single click or slip of the tongue can cost you thousands....

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>