Why does your business need endpoint protection?
In today's world, where digital technology is everywhere, keeping our online information safe is more important than ever. For businesses, this means paying special attention to something called "endpoint protection". But what is an endpoint? Simply put, an endpoint...
Are identity platforms the solution to deepfakes?
Detecting deepfakes or training vigilance has a limited impact on fighting deepfake fraud. But identity platforms can help future-proof us against this threat, writes Daniel Robus, chief revenue officer at Contactable. In early January, an employee at an undisclosed...
Ramp up defences to combat rising cyberthreats
The rise of cyberattacks using old tricks and proven methods is expected to continue. Criminal organisations are relentlessly seeking access to your systems, aiming to exploit vulnerabilities in your environment and disrupt your supply chain. By John Mc Loughlin, CEO...
Avoid job scams and find a job you love
As the working year unfolds alongside Valentine's season, many South Africans are seeking a different kind of love- a fulfilling career, despite persistently high unemployment figures. Just like the dating world, the task of finding the perfect match can be...

Identity is at the core of Zero Trust
In an age marked by an unprecedented surge in cyberthreats and data breaches, the importance of cybersecurity has reached new heights. Organisations worldwide are grappling with a mounting tide of cybercrime, with estimates from Cybersecurity Ventures projecting that...
New year … same old scams
Beware of scammers looking to take your hard-earned cash and private information, warns Momentum Metropolitan's cybersecurity team. The reality is that fraud and scamming is increasing at an alarming rate. According to the Southern African Prevention Service (SAFPS),...
Adversary-in-the-middle attacks make a comeback
In the dynamic realm of cybersecurity, threats often disappear temporarily, only to evolve and reappear in more sophisticated forms. By Divan de Nysschen, cybersecurity architect at NEC XON One such resurgence is the Adversary-in-the-Middle (AiTM) attack, a potent...
Digital citizenship in the smart city era
What is a smart city? For many, the answer is technology. A smart city is, by definition, a technologically modern urban area that uses different types of electronic methods and sensors (sometimes hundreds or thousands) to collect specific data. By Bertus Engelbrecht,...
Cybersecurity luminaries join forces with Commvault to define cyber resilience
Commvault has announced that cybersecurity experts across a host of industries -- from security to public sector to technology -- have joined the Commvault Cyber Resilience Council. Council members will advise Commvault on emerging security trends and cyber threats as...
The power of unified cloud protection
Security Service Edge (SSE) is poised to play a pivotal role in modern businesses by enhancing security, ensuring secure access to cloud services, improving network performance, optimising bandwidth utilisation, and enabling cost efficiency and scalability. By John Mc...
Unravelling African network security trends
The fear of cyber incidents has topped the Allianz Risk Barometer 2024 list as the most important business risk for the third consecutive year. Voted into the number one position by several countries across Africa, including Kenya, Mauritius, Nigeria and Uganda, it's...
CEOs lack confidence in the ability to minimise cyberattacks
CEOs are fully aware of the threats to their business from cyberattacks. Yet, most lack confidence in their organisation's ability to avert or minimise such attacks. They learn how to be cyber resilient only after their organisation experiences a breach. By Boland...