Trend secures AI infrastructure with Nvidia
Organisations worldwide are racing to implement agentic artificial intelligence (AI) solutions to drive innovation and competitive advantage. However, this revolution introduces security challenges - particularly for organisations in highly regulated industries that...
Kaspersky supports Interpol in curbing infostealer threat
Kaspersky has assisted Interpol in its latest operation Secure that focused on disrupting infostealer threat and taking down infrastructure hosting such malware. The operation has brought together law enforcement agencies from 26 participating countries and Interpol’s...
Secure the network with AI-powered single-vendor SASE
Troye has announced the general availability of HPE Aruba Networking’s AI-powered, single-vendor Secure Access Service Edge (SASE) solution. Secure Access Service Edge (SASE) is a cybersecurity and networking paradigm first coined by Gartner in August 2019. SASE...

When AI becomes the ultimate manipulator
Once the domain of elite spies and con artists, social engineering is now in the hands of anyone with an internet connection – and AI is the accomplice. Supercharged by generative tools and deepfake technology, today’s social engineering attacks are no longer sloppy...
SensePost offers developer-oriented security training
Orange Cyberdefence SensePost will be launching a new information security training course aimed at enriching software developers with security thinking. The SecDevOps course has been developed by penetration testers who test the security of applications, IT...
Deepfakes a growing threat to SA corporations
Artificial intelligence (AI) has now made it possible to wake up to a video of your CEO seemingly admitting to fraud or receiving an urgent audio message from your chief financial officer authorising a large, unexpected transaction, without any of it being real. By...
Goodbye CISO scapegoating as the age of corporate accountability arrives
Responsibility for cybersecurity and data resilience can no longer be placed on the shoulders of chief information security offices (CISOs) alone. By Andre Troskie, EMEA field CISO at Veeam New EU regulations like NIS2 and DORA bring corporate accountability to the...
Align cybersecurity with ESG for sustainable security
As organisations navigate an increasingly complex digital landscape, the convergence of cybersecurity and Environmental, Social, and Governance (ESG) principles has emerged as a critical consideration. By Ryan Boyes, governance, risk and compliance officer at Galix...
To keep critical data safe, open a gap
South African organisations are becoming increasingly vigilant when it comes to addressing the growing cyberthreat landscape. In fact, more local companies are prioritising cyber risk mitigation when compared to the global average. By Michael Langeveld, head of...

How GenAI is leaking companies’ secrets
Beneath the surface of GenAI’s outputs lies a massive, mostly unregulated engine powered by data – your data. And whether it’s through innocent prompts or habitual oversharing, users are feeding these machines with information that, in the wrong hands, becomes a...

NEC XON, Palo Alto Networks unite to unlock ROI
NEC XON, a newly certified Palo Alto Networks Diamond Partner, has unveiled its platform-led cybersecurity strategy designed to maximise return on security investment (ROI) for enterprise customers across Africa and beyond. “Tool sprawl is one of the biggest drivers...
Check Point delivers brand office firewall
Check Point Software Technologies has announced major advancements to its family of Quantum Force Security Gateways. All Quantum Force Security Gateways for the data center and perimeter are receiving a 15%-25% performance boost in threat prevention throughput –...