CIPC hack could have serious consequences for SA organisations
The South African Companies and Intellectual Property Commission (CIPC) holds the registration details of companies, co-operatives and intellectual property rights within a vast database that comprises ID numbers, addresses, contact information and more. It has also...
CISO role evolves to one of strategic leadership
The role of the chief information security officer (CISO) has evolved significantly, prompting questions about reporting structures within organisations. By Simeon Tassev, MD and QSA at Galix. Traditionally, the CISO reported to the chief information officer (CIO),...
Choosing the right cybersecurity partner is non-negotiable in supply chain
Finding the right cybersecurity specialist ranks among a logistics firm's most important tasks. With South Africa now among the world's biggest cybercrime hotspots, these companies are scrambling to guard against new and highly sophisticated attacks. The ransomware...
Don’t gamble with your cybersecurity
The recent wave of cyberattacks targeting the global casino and hospitality industries has raised alarm bells. Carey van Vlaanderen, CEO of ESET South Africa, says smaller chains, online gaming sites and their customers are equally susceptible. Fortunately, there are...
Fortify data security to protect against cyberthreats and meet regulatory demands
As cyberthreats continue to rise and data becomes an increasingly valuable business commodity, South Africa's data regulation landscape is evolving, and businesses need to prioritise data security and privacy measures. By Modeen Malick, principal systems engineer at...
How to navigate the fusion of GenAI and digital defence
The convergence of Generative AI (GenAI) and cybersecurity has emerged as a critical battleground amid ongoing digital transformation. Mandla Mbonambi, CEO of Africonology, asserts that in this dynamic intersection, cybersecurity professionals stand at the forefront,...
Deception technology crucial to unmasking the silent theft of data
The "silent theft" of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation. By Iniel Dreyer, MD of Data...
Why does your business need endpoint protection?
In today's world, where digital technology is everywhere, keeping our online information safe is more important than ever. For businesses, this means paying special attention to something called "endpoint protection". But what is an endpoint? Simply put, an endpoint...
Are identity platforms the solution to deepfakes?
Detecting deepfakes or training vigilance has a limited impact on fighting deepfake fraud. But identity platforms can help future-proof us against this threat, writes Daniel Robus, chief revenue officer at Contactable. In early January, an employee at an undisclosed...
Ramp up defences to combat rising cyberthreats
The rise of cyberattacks using old tricks and proven methods is expected to continue. Criminal organisations are relentlessly seeking access to your systems, aiming to exploit vulnerabilities in your environment and disrupt your supply chain. By John Mc Loughlin, CEO...
Avoid job scams and find a job you love
As the working year unfolds alongside Valentine's season, many South Africans are seeking a different kind of love- a fulfilling career, despite persistently high unemployment figures. Just like the dating world, the task of finding the perfect match can be...
Identity is at the core of Zero Trust
In an age marked by an unprecedented surge in cyberthreats and data breaches, the importance of cybersecurity has reached new heights. Organisations worldwide are grappling with a mounting tide of cybercrime, with estimates from Cybersecurity Ventures projecting that...