Extra protection needed for high-value data
As artificial intelligence (AI) accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent. This is according to...
Ransomware in 2025 and what to expect in 2026
The economic toll of ransomware could be staggering, writes Fabio Assolini, head of research centre: Americas and Europe, Global Research & Analysis Team at Kaspersky. VDC Research and Kaspersky conducted an estimation which showed that in the manufacturing sector...
The business case for MDR: Protecting clients when threats don’t sleep
For many South African organisations, the real test of their cybersecurity resilience is not whether they have the right tools in place, but whether anyone is actively watching their environment when attackers make their move and can respond immediately when something...
‘I have nothing to hide’ is the most comfortable lie in cybersecurity
International Data Privacy Day (28 January) usually brings a wave of advice about passwords and privacy settings. Most of us tune it out. We fall back on the comfortable, dangerous cop-out: "I am boring. I have nothing to hide." Richard Ford, chief technology officer...
Why you must train your AI agents just as hard as your employees
As Data Privacy Day approaches (28 January 2026), the conversation around protecting information has shifted yet again. For years, the mantra was simple: train your people. But in 2026, the workforce has expanded. We have arrived at a point where we are managing the...
Annual job hopping makes for a grim cybersecurity season
Many South Africans will be switching jobs come January and February after year-end bonuses and some post-holiday reflection. By Heino Gevers, senior director of technical support at Mimecast SA And, while HR departments are geared up to contend with the expected...
In fraud, we need to accept that seeing is no longer believing
By Richard Ford, group chief technology officer of Integrity360, outlines this scenario: You answer the phone. It is your daughter. You know it is her because you recognise the panic in her voice. She has run out of petrol in an area she doesn’t know; her phone is on...
Using AI to protect data is crucial
The cybersecurity landscape is rapidly changing, with hackers increasingly utilising artificial intelligence (AI) to carry out sophisticated attacks on their targets, writes Hemant Harie, group chief technology officer at Data Management Professionals South Africa. To...
Axis Communications signs CISA Secure by Design pledge
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling its commitment to upholding and transparently communicating the cybersecurity posture of its products. A voluntary pledge...
Kaspersky enables independent transparency, accountability assessment
Kaspersky has released Protection beyond detection: Why trust and transparency decide your cybersecurity future, a new whitepaper based on an independent transparency and accountability assessment of 14 leading cybersecurity vendors. Kaspersky emerged as one of the...
Cisco debuts integrated AI security and safety framework
AI is no longer an experimental capability or a back-office automation tool: it is becoming a core operational layer inside modern enterprises. The pace of adoption is breathtaking. By Amy Chang, AI threat research and security team lead at Cisco Yet, according to...
Excuse me while I slip on past your security
Attackers are bypassing the very tools designed to prevent them from gaining access to the business, writes Richard Frost, head of technology solutions and consulting at Armata Cyber Security. AI-powered phishing has become the most virulent security threat to the...