Fortinet expands unified SASE coverage with SA point-of-presence
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Johannesburg, expanding the reach and availability of Fortinet Unified SASE for customers across South Africa and Southern African countries. The increase in remote working and hybrid...
Trend Micro stops deepfakes and AI attacks
Trend Micro has announced additions in its enterprise platform and consumer cybersecurity products focused on protecting all environments from the rapidly growing threat of AI-based attacks and fraud. Trend research shows that cybercriminals are catching on to the...

Olympic and Paralympic Games open new attack opportunities
The Paris 2024 Olympics games are here, and for the first time since 2020, spectators are welcome to attend, with an influx of 15-million people expected to attend the events. As the world's attention has turned to this prestigious event, experts and law enforcement...

Cybersecurity in the era of quantum computing
As quantum computing technology rapidly advances, businesses and governments around the world are facing a looming threat to their cybersecurity. By Amritesh Anand, vice-president and MD: technology services group at In2IT Technologies. Quantum computers, with their...

Evolving data challenges need evolving data protection solutions
Managing data has become increasingly difficult and protecting it has never been more important. This is often a challenge, however, writes Graham Brown, regional manager of Commvault SA/SADC. With data being both moved to the cloud and repatriated as consolidation...

Address the security sprawl
Many companies still consider cybersecurity a grudge purchase. What is worse, these businesses often only allocate the necessary funds after an incident or a regulatory change forces their hands. The normalisation of the hybrid work environment has certainly...

How AI empowers defenders and emboldens attackers
Artificial intelligence (AI) has profoundly influenced the landscape of cyber warfare, serving as a double-edged sword for both attackers and defenders. By Kumar Vaibhav, lead senior solution architect: cyber security at In2IT Defined as machines capable of mimicking...
What business leaders need to know about AI in security
New artificial intelligence (AI) tools help criminals orchestrate elaborate frauds. Earlier this year, thieves made off with $25-million from engineering firm Arup, impersonating the company's CFO to manipulate an employee into transferring the money. More recently,...
Businesses urged to strengthen security posture
Implementing a comprehensive approach to cybersecurity and data protection are the first proactive steps to strengthening the security posture of any business. Organisations such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework 2.0...
The evolution of zero trust
Around 18 months ago, I was writing about the "endless journey" to zero trust, writes Dave Russell, vice-president: enterprise strategy at Veeam. I used the word "endless" because zero trust is a mindset rather than a product or a destination - it's a target to aim...

Why modern organisations need advanced endpoint security
Security technologies have come a long way from the anti-virus and firewall solutions of the past. As data grows exponentially, traditional security measures are no longer effective. David Herselman, MD of inq South Africa Artificial intelligence (AI) is playing an...
Cybersecurity fatigue a growing risk in the age of AI-driven attacks
Although the tactics and technologies cybercriminals use have evolved over the past 20 years, phishing and other social engineering attacks are nothing new. But despite the significant amounts of time and money invested in cybersecurity training and awareness,...