Cybersecurity research empowers law enforcement
The threat landscape has expanded in recent years as our world has become more interconnected. This has resulted in cybercriminals seeking out more opportunities to exploit vulnerabilities for profit. Emmanuel Tzingakis, technical lead: African and venture markets at...
How augmented reality is impacting security
Recently Apple launched its Apple Vision Pro to much fanfare and has pushed the discussion of augmented reality (AR) beyond the realms of gaming and entertainment. From healthcare innovations to retail experiences and manufacturing enhancements, AR has the potential...
Encryption-less data breaches add complexity to cybersecurity challenges
In an ever-evolving world of attack types and threat actors, businesses are having to maintain extra vigilance. From popular DDoS (Distributed Denial-of-Service) attacks that flood the host's network until it crashes, to specialised ransomware actors looking for a...

PCI DSS v4.0 a game-changer in social engineering awareness, prevention
As social engineering attacks continue to rise in sophistication and prevalence, the Payment Card Industry Data Security Standard (PCI DSS) has evolved to address this growing threat. PCI DSS v4.0 places a strong emphasis on social engineering awareness and...
Overcoming security alert fatigue
Alert fatigue represents more than a mere inconvenience for security operations centre (SOC) teams; it poses a tangible threat to enterprise security. By Brandon Rochat, regional sales director: Africa at Cybereason When analysts confront a deluge of thousands of...
Top network security trends for 2024
With the first quarter of 2024 now closed, we can predict with a fair amount of accuracy what the key secure access service edge (SASE) trends of the year will be, writes Nirav Shah, vice-president of products at Fortinet. Before discussing trends, let's set the stage...

What are MFA fatigue attacks and how can they be prevented?
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering...
How to spot a cyberattack if you aren’t a security pro
Business owners and executives dread receiving that call: criminals have breached their computer systems. It may happen in a flash, but this moment is often the culmination of days to months of moves by cybercriminals, finding ways into systems, gaining control, and...
Embedded physical, digital security needed in Africa’s oil and gas sector
Oil and gas play an important role in Africa's present and future prospects. In South Africa especially, local gas production is expected to grow at a CAGR of 48% by 2027, thanks in part to several recently discovered deposits off the country's coastline. By Marcel...
A growing imperative for cybersecurity transparency in African enterprises
As African governments and enterprises build momentum around digital transformation, they face mounting pressure not only to fortify their cybersecurity measures, but also to embrace transparency in disclosing cyberattacks. Bryan Hamman, regional director for Africa...
Cybersecurity concerns mount in mining arena
In today's digital era, the Internet's evolution and technologies like the Internet of Things (IoT) have equalised the cybersecurity landscape. No industry, including the mining sector, is exempt from cyber threats such as phishing, ransomware, malware, and financial...

Security intelligence needs AI and ML-powered data protection, risk response
From retail to government, private sector to financial services, organisations of all types and sizes are vulnerable to a constantly evolving threats. By Lourens Sanders, senior sales engineer at Commvault The consequences of a breach have also become increasingly...