
We need to rethink employee phishing tests
Employee phishing tests have gained popularity as a way for organisations to gauge how vulnerable their employees are to phishing attacks and improve their awareness of cybersecurity. However, some have questioned whether it is appropriate to use fear, shame and...
A glimpse into the future of the modern cybersecurity perimeter
In the fluid cybersecurity landscape, the focus has shifted from fortifying network perimeters to acknowledging the critical role of identity and user authentication. By Michael de Neuilly Rice, cybersecurity architect at NEC XON Threat actors no longer exploit...
Kids returning to school face digital minefield
The start of the new school year marks an exciting new phase for kids, but it could also mark the first step into a minefield of online risks. This is the warning from Doros Hadjizenonos, regional director at Fortinet, who says young children, tweens and teens face a...
Cybersecurity trends to watch in 2024
The persistent myth is that cybercrime only targets the biggest companies and economies but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers. South Africa is a prime example: even though it ranks 38th among major...
Here’s a new method to detect Pegasus iOS spyware
Kaspersky's Global Research and Analysis Team (GReAT) has developed a lightweight method to detect indicators of infection from sophisticated iOS spyware such as Pegasus, Reign, and Predator through analysing Shutdown.log, a previously unexplored forensic artifact....
What to expect from the cybersecurity landscape in 2024
As widely reported last year, South Africa received the most cybersecurity threats on the continent by far - 230-million compared to second-placed Morocco's 71-million in 2022. Virodh Sunderlall, product manager at Tarsus On Demand, says South Africa is particularly...
Sharenting and security concerns
Sharing that cute photo of your kid's first day at school may have harmless intentions, but there are downsides to sharing too much information about your little ones online. This is according to Carey van Vlaanderen, CEO of ESET Southern Africa, who says: "It may be...

SA companies need a holistic approach to BEC
As business email compromise (BEC) tactics become more sophisticated, South African organisations need a holistic response plan in place, before an attack happens, writes Ryan Mer, CEO of eftsure Africa. As technology advances, criminals are leveraging artificial...

Cyber resilience in 2024 – protect, defend, recover
Data has become a core business asset, and protecting this asset from data loss is a strategic priority, especially as new threats are constantly emerging. By Kate Mollett, regional director of Commvault SA/SADC The escalating sophistication of cyber threats will...
The ransomware dilemma: to pay or not to pay?
The rise of ransomware attacks has become an alarming trend, causing business leaders to grapple with a difficult question: should they negotiate with ransomware attackers and pay the demanded ransom? This dilemma poses many challenges, and businesses must weigh the...
AI-powered cybersecurity won’t supersede the human firewall
In the world of cybersecurity, it is always a challenge to keep up with the evolving threat landscape. As we look into the future, it's evident that artificial intelligence (AI) will play a growing role in protecting the digital assets of organisations. By Martin...

Tech trends affecting the security sector in 2024
Even for those of us who have been working in the technology industry for decades, the pace of change over the past 12 months has been extraordinary. By Johan Paulsson, chief technology officer at Axis Once again, we’re left in no doubt that technological innovations...