Check Point is a leader in hybrid mesh firewall
Check Point Software Technologies has been named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewalls for execution and completeness of vision. "Today’s hyperconnected, highly distributed enterprise networks have expanded the perimeter and attack...
Embedding cybersecurity compliance into core operations essential for business resilience
With the value of data continually on the rise and the consequences of a breach becoming increasingly severe, cybersecurity compliance can simply no longer be an afterthought – it is a fundamental pillar of business resilience. By Ryan Boyes, governance, risk and...
Microsoft’s breach warns of a new corporate risk
The rise of generative AI has changed how we work, live, and create. For many employees, tools like ChatGPT and Copilot have become go-to assistants for everything from drafting emails and summarising reports to brainstorming creative ideas. By Richard Ford, chief...
Could gamification build better habits and protect users?
Traditional cybersecurity and compliance training can be dull as dishwater, which can lead to poor engagement and low retention among employees. Gamification, if done well, offers a refreshing alternative, transforming boring modules into interactive experiences that...
Think you’re too small to be hacked? Think again
For years, small and mid-sized enterprises (SMEs) have convinced themselves they’re “not a target”. No one’s trying to breach the corner bakery, the local law firm, or the regional logistics company - right? Wrong. By Kurt Goodall, technical director of Troye Hackers...
Unseen cyber enemies linger in the networks of SA’s most vulnerable sectors
Advanced persistent threats (APTs) don’t crash into networks with noise – they slip in silently, lie in wait, and stay there for months or even years. Their goal isn’t quick disruption or petty theft, but prolonged, covert access that allows them to spy, steal, and...
Preparedness is a competitive advantage in cybersecurity
In 2025, several prominent South African companies faced the all-too-common reality of a cyberattack. Some took days to respond, with their systems offline and reputations on the line. Others, though fewer in number, recovered quickly, communicated clearly, and...
Could retrospective analysis be a secret weapon against APTs?
Rapid digital transformation is most definitely creating vast new opportunities across Africa, but, at the same time, it’s also opening up a larger attack surface for threat actors to exploit. In this environment, one capability proving to be a game-changer for local...
Trend Micro adds digital twin technology
Trend Micro has unveiled a new cyber resilience model that reinvents how enterprises approach proactive security. Trend’s Digital Twin capabilities will empower enterprises to simulate real-world cyber threats, validate their defenses, and adapt policies in real time...
Your WiFi router is about to start watching you
Imagine this: your WiFi router knows when you've fallen down the stairs, whether you're having trouble breathing, and exactly how many times you've visited the loo today. By Paul Colmer, executive committee member of WAPA It can also detect when your teenager is...
What businesses should be doing instead of buying more tech
A year after law enforcement paraded the takedown of LockBit as a victory for cybersecurity, the harsh reality has set in: ransomware didn’t retreat - it metastasised. The criminals didn’t stop; they just got smarter, writes John Mc Loughlin, CEO of J2 Software. Now,...
Vishing awareness live in Kaspersky ASAP portfolio
Kaspersky has introduced a new module on vishing (voice phishing) to its ASAP (Automated Security Awareness Platform). Vishing has become a major vector for corporate fraud. For example, AIB saw a 79% year-on-year increase in vishing attacks in early 2025, including a...