New year … same old scams
Beware of scammers looking to take your hard-earned cash and private information, warns Momentum Metropolitan's cybersecurity team. The reality is that fraud and scamming is increasing at an alarming rate. According to the Southern African Prevention Service (SAFPS),...
Adversary-in-the-middle attacks make a comeback
In the dynamic realm of cybersecurity, threats often disappear temporarily, only to evolve and reappear in more sophisticated forms. By Divan de Nysschen, cybersecurity architect at NEC XON One such resurgence is the Adversary-in-the-Middle (AiTM) attack, a potent...
Digital citizenship in the smart city era
What is a smart city? For many, the answer is technology. A smart city is, by definition, a technologically modern urban area that uses different types of electronic methods and sensors (sometimes hundreds or thousands) to collect specific data. By Bertus Engelbrecht,...
Cybersecurity luminaries join forces with Commvault to define cyber resilience
Commvault has announced that cybersecurity experts across a host of industries -- from security to public sector to technology -- have joined the Commvault Cyber Resilience Council. Council members will advise Commvault on emerging security trends and cyber threats as...
The power of unified cloud protection
Security Service Edge (SSE) is poised to play a pivotal role in modern businesses by enhancing security, ensuring secure access to cloud services, improving network performance, optimising bandwidth utilisation, and enabling cost efficiency and scalability. By John Mc...
Unravelling African network security trends
The fear of cyber incidents has topped the Allianz Risk Barometer 2024 list as the most important business risk for the third consecutive year. Voted into the number one position by several countries across Africa, including Kenya, Mauritius, Nigeria and Uganda, it's...
CEOs lack confidence in the ability to minimise cyberattacks
CEOs are fully aware of the threats to their business from cyberattacks. Yet, most lack confidence in their organisation's ability to avert or minimise such attacks. They learn how to be cyber resilient only after their organisation experiences a breach. By Boland...
Dark web trends uncovered
Last year, Kaspersky experts witnessed a significant uptick in stealers and extortion activities on the dark web market. Looking ahead, the company also anticipates new challenges, including a heightened presence of crypto-drainer services, increased promotion of...
Cyber deception gains traction
The continuous evolution in sophistication and the rising frequency of cyber threats means that next level stealth attacks are becoming increasingly difficult to detect and prevent with traditional cybersecurity technology. By Saul Wamalwa, regional manager for West,...
Building a framework for effective, agile endpoint security
The mitigation of endpoint security risks has come increasingly under the spotlight over the past few years, due chiefly to a growing distributed workforce. So it makes sense that local businesses are making the necessary changes to their cybersecurity strategies to...
We need to rethink employee phishing tests
Employee phishing tests have gained popularity as a way for organisations to gauge how vulnerable their employees are to phishing attacks and improve their awareness of cybersecurity. However, some have questioned whether it is appropriate to use fear, shame and...
A glimpse into the future of the modern cybersecurity perimeter
In the fluid cybersecurity landscape, the focus has shifted from fortifying network perimeters to acknowledging the critical role of identity and user authentication. By Michael de Neuilly Rice, cybersecurity architect at NEC XON Threat actors no longer exploit...