Why cybersecurity awareness is failing, and what to fix first
South African businesses are investing heavily in cybersecurity technology. Detection tools are becoming more sophisticated, monitoring is more advanced, and response capabilities are faster. Yet most breaches still begin with a human error, writes Charmé van der...
Is this the calm before the cyberstorm?
No one enters the cybersecurity sector expecting serenity. The pace is relentless, and the stakes are high. By Brendan Widlake, regional director of Veeam Software South Africa According to the World Economic Forum, the weekly number of cyberattacks has more than...
Shadow IT is a symptom of friction, not rebellion
The use of unapproved apps and systems inside an organisation, known as Shadow IT, is often viewed as a rebellious act by employees looking to break the rules. The reality is far more nuanced. Shadow IT is rarely malicious; it is usually a quite rational decision made...
Cybersecurity awareness is a behavioural discipline, not an IT project
An employee receives an email from a Gmail address asking for payslips. It feels routine, and without hesitation, the attachment is sent. Or the employee can pause, verify the sender, and confirm the request. This is just one of many similar moments that determine...
The AI-SOC paradox: High hopes confront implementation hurdles
Almost all companies planning to establish a Security Operations Centre (SOC) regard artificial intelligence (AI) as a must-have component. However, despite high expectations, organisations face significant challenges in deploying and operationalising AI effectively....
SA CISOs facing burnout epidemic. AI is the cause – and solution
South African CISOs are operating in a perfect storm. The rising volume and sophistication of attacks, constrained budgets, and a deepening skills shortage are adding to the mental strain of alert fatigue and the growing expectations from boards. While AI holds a...
AI is silently turning into your organisation’s biggest cyber threat
AI didn’t storm in with board approval or a security checklist, writes By John Mc Loughlin, CEO of J2. It crept in unnoticed, drafting emails faster than you can read them, generating code on the fly, automating workflows behind the scenes, and empowering support...
AI and cybersecurity: Trust must come before scale
As artificial intelligence continues its rapid move from experimentation into production environments, 2025 marked a turning point for how organisations approach AI adoption – particularly in the context of cybersecurity, governance and enterprise risk. According to...
How SaaS supply chains became cybersecurity’s new weak link
Software-as-a-Service (SaaS) is no longer an IT choice; it’s the operating system of business itself. By Avinash Gupta, head of centre of excellence at In2IT Technologies From Salesforce to Workday, Microsoft 365 to Slack, the SaaS layer now underpins collaboration,...
How to spot and avoid cyber scams during the 2026 Winter Competitions
The 2026 Winter Olympic Games are in full swing, captivating sports fans worldwide. However, the Games also serve as an opportunity for scammers to strike with different kinds of cyber fraud. Kaspersky has identified some of the key scams targeting fans right now –...
AI in cybersecurity: battleground or breakthrough?
The rise of artificial intelligence (AI) has transformed industries from healthcare to finance, but one area where its influence is both promising and perilous is cybersecurity. By Avinash Gupta, head of Centre of Excellence at In2IT Technologies On one hand, AI...
Cyber resilience moves from IT issue to board risk
Cybersecurity has shifted decisively from an IT concern to a core business risk, and South African organisations are feeling this change acutely. By Boland Lithebe, security lead for Accenture, South Africa The World Economic Forum’s Global Cybersecurity Outlook 2026...