
Address the security sprawl
Many companies still consider cybersecurity a grudge purchase. What is worse, these businesses often only allocate the necessary funds after an incident or a regulatory change forces their hands. The normalisation of the hybrid work environment has certainly...

How AI empowers defenders and emboldens attackers
Artificial intelligence (AI) has profoundly influenced the landscape of cyber warfare, serving as a double-edged sword for both attackers and defenders. By Kumar Vaibhav, lead senior solution architect: cyber security at In2IT Defined as machines capable of mimicking...
What business leaders need to know about AI in security
New artificial intelligence (AI) tools help criminals orchestrate elaborate frauds. Earlier this year, thieves made off with $25-million from engineering firm Arup, impersonating the company's CFO to manipulate an employee into transferring the money. More recently,...
Businesses urged to strengthen security posture
Implementing a comprehensive approach to cybersecurity and data protection are the first proactive steps to strengthening the security posture of any business. Organisations such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework 2.0...
The evolution of zero trust
Around 18 months ago, I was writing about the "endless journey" to zero trust, writes Dave Russell, vice-president: enterprise strategy at Veeam. I used the word "endless" because zero trust is a mindset rather than a product or a destination - it's a target to aim...

Why modern organisations need advanced endpoint security
Security technologies have come a long way from the anti-virus and firewall solutions of the past. As data grows exponentially, traditional security measures are no longer effective. David Herselman, MD of inq South Africa Artificial intelligence (AI) is playing an...
Cybersecurity fatigue a growing risk in the age of AI-driven attacks
Although the tactics and technologies cybercriminals use have evolved over the past 20 years, phishing and other social engineering attacks are nothing new. But despite the significant amounts of time and money invested in cybersecurity training and awareness,...
Protect digital ID with phone number security
Phone numbers have evolved into essential identifiers, akin to personal IDs and crucial for logging into numerous online services ranging from social networks to banking apps. As such, control over these digits is pivotal, with their loss potentially leading to...

Collaboration, investment key to strengthening Africa’s digital payments cybersecurity
As the digital payments landscape in Africa expands, the need for robust cybersecurity measures becomes increasingly urgent. By Omotayo Ogunlade, chief technology officer at Onafriq Trust and security are foundational to financial services, and as cybercriminals...
Trend Micro debuts Inline NDR
Trend Micro has announced Inline NDR, available in the Trend Vision One platform where it improves detection and response across all security functions rather than operating as an isolated solution. NDR tools are commonly deployed in large enterprises that have many...

Digital world makes defending against more relevant
In a hyper-connected, always-on world, both citizens and businesses must develop robust, multi-layered cybersecurity strategies to combat the flourishing cybercrime ecosystem. By Michael de Neuilly-Rice, cyber security architect at NEC XON These illicit markets have...

SMEs, you are the low hanging fruit for cybercriminals
According to an IBM report, on average it takes nearly 287 days to detect and contain a data breach. A lot of damage can be done in such a long period of time. For one thing, your reputation can go down the drain along with your dream of selling this great little...