Cybersecurity in the era of quantum computing
As quantum computing technology rapidly advances, businesses and governments around the world are facing a looming threat to their cybersecurity. By Amritesh Anand, vice-president and MD: technology services group at In2IT Technologies. Quantum computers, with their...

Evolving data challenges need evolving data protection solutions
Managing data has become increasingly difficult and protecting it has never been more important. This is often a challenge, however, writes Graham Brown, regional manager of Commvault SA/SADC. With data being both moved to the cloud and repatriated as consolidation...

Address the security sprawl
Many companies still consider cybersecurity a grudge purchase. What is worse, these businesses often only allocate the necessary funds after an incident or a regulatory change forces their hands. The normalisation of the hybrid work environment has certainly...

How AI empowers defenders and emboldens attackers
Artificial intelligence (AI) has profoundly influenced the landscape of cyber warfare, serving as a double-edged sword for both attackers and defenders. By Kumar Vaibhav, lead senior solution architect: cyber security at In2IT Defined as machines capable of mimicking...
What business leaders need to know about AI in security
New artificial intelligence (AI) tools help criminals orchestrate elaborate frauds. Earlier this year, thieves made off with $25-million from engineering firm Arup, impersonating the company's CFO to manipulate an employee into transferring the money. More recently,...
Businesses urged to strengthen security posture
Implementing a comprehensive approach to cybersecurity and data protection are the first proactive steps to strengthening the security posture of any business. Organisations such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework 2.0...
The evolution of zero trust
Around 18 months ago, I was writing about the "endless journey" to zero trust, writes Dave Russell, vice-president: enterprise strategy at Veeam. I used the word "endless" because zero trust is a mindset rather than a product or a destination - it's a target to aim...

Why modern organisations need advanced endpoint security
Security technologies have come a long way from the anti-virus and firewall solutions of the past. As data grows exponentially, traditional security measures are no longer effective. David Herselman, MD of inq South Africa Artificial intelligence (AI) is playing an...
Cybersecurity fatigue a growing risk in the age of AI-driven attacks
Although the tactics and technologies cybercriminals use have evolved over the past 20 years, phishing and other social engineering attacks are nothing new. But despite the significant amounts of time and money invested in cybersecurity training and awareness,...
Protect digital ID with phone number security
Phone numbers have evolved into essential identifiers, akin to personal IDs and crucial for logging into numerous online services ranging from social networks to banking apps. As such, control over these digits is pivotal, with their loss potentially leading to...

Collaboration, investment key to strengthening Africa’s digital payments cybersecurity
As the digital payments landscape in Africa expands, the need for robust cybersecurity measures becomes increasingly urgent. By Omotayo Ogunlade, chief technology officer at Onafriq Trust and security are foundational to financial services, and as cybercriminals...
Trend Micro debuts Inline NDR
Trend Micro has announced Inline NDR, available in the Trend Vision One platform where it improves detection and response across all security functions rather than operating as an isolated solution. NDR tools are commonly deployed in large enterprises that have many...