Protect digital ID with phone number security
Phone numbers have evolved into essential identifiers, akin to personal IDs and crucial for logging into numerous online services ranging from social networks to banking apps. As such, control over these digits is pivotal, with their loss potentially leading to...

Collaboration, investment key to strengthening Africa’s digital payments cybersecurity
As the digital payments landscape in Africa expands, the need for robust cybersecurity measures becomes increasingly urgent. By Omotayo Ogunlade, chief technology officer at Onafriq Trust and security are foundational to financial services, and as cybercriminals...
Trend Micro debuts Inline NDR
Trend Micro has announced Inline NDR, available in the Trend Vision One platform where it improves detection and response across all security functions rather than operating as an isolated solution. NDR tools are commonly deployed in large enterprises that have many...

Digital world makes defending against more relevant
In a hyper-connected, always-on world, both citizens and businesses must develop robust, multi-layered cybersecurity strategies to combat the flourishing cybercrime ecosystem. By Michael de Neuilly-Rice, cyber security architect at NEC XON These illicit markets have...

SMEs, you are the low hanging fruit for cybercriminals
According to an IBM report, on average it takes nearly 287 days to detect and contain a data breach. A lot of damage can be done in such a long period of time. For one thing, your reputation can go down the drain along with your dream of selling this great little...
Cybersecurity an organisational responsibility given the threat from AI
While tools such as ChatGPT have caught the public imagination, artificial intelligence (AI) and machine learning (ML), a branch of AI, are now important tools in industries ranging from travel and insurance to media and finance. By Wendy Tembedza, partner, Dario...
Kaspersky named as a leader in threat intelligence
Kaspersky has been recognised as a Leader in the 2024 Spark Matrix: Digital Threat Intelligence Management by Quadrant Knowledge Solutions for the second year in a row, reaffirming its technological excellence and customer impact. According to the 'XDR and SOC...
Game over? Not with the right cybersecurity protection in place
There is an old saying which notes that "there's nothing new under the sun". Gamers today, however, might disagree, because, as computing and graphics power has grown exponentially in the last few decades, gamers around the world share in a feeling of being deeply...
The advantage of a trusted partner for security risk and compliance
In an increasingly digital world, businesses are faced with the dual challenges of navigating the complexity of cybersecurity best practices alongside a growing body of data privacy and governance legislation. Both these areas hinge on understanding and managing data...

Secure your business-critical processes in the cloud
African enterprises are transforming their operations through the accelerating adoption of cloud technologies. By David Yawalkar, global head: operational product marketing for RISE with SAP As companies continue to face disruption and a challenging operating...
Enjoy the convenience of digital payments – and stay safe
With more than 184-million people across Africa having embraced mobile money according to a GSMA report, and with Discovery Bank and Visa research showing an increasing popularity of contactless payments and digital wallets in South Africa, these solutions have become...
Addressing cyber security in renewables key for energy security
While renewable energy is a key component to achieving the world's net zero goals, the reality is that there is still work to do to ensure it can be relied upon as a secure energy source. With solar energy backed as one of the world's primary energy sources of the...