Why attack surface management must look both inside and out
Attack surface management (ASM) has grown exponentially in recent years, evolving into a recognised market category that equips businesses with the strategies and visibility needed to protect their digital assets. By Kyle Pillay, security as a service manager at...
Cybercriminals exploit our best intentions
Cybercriminals are not only using fear and urgency to exploit their victims. Positive emotions – such as empathy, curiosity, and a desire to help – are also being exploited. This is the warning from Anna Collard, senior vice-president: content strategy and CISO...
Multi-cloud AI security: finding order in the chaos
Artificial intelligence (AI) is transforming how organisations innovate, serve customers, and operate at scale. By Avinash Gupta, head of Centre of Excellence at In2IT Technologies But when these workloads stretch across multiple cloud providers, complexity rises...
GenAI-driven cyberattacks force a shift to predictive security
The rise of generative artificial intelligence (GenAI)-driven attacks and the growing complexity of interconnected supply chains has placed South African organisations at risk. As cyberfraud becomes commoditised, with bad actors now able to carry out...
The hard truth about endpoint security: Attackers are already ahead
Is endpoint security keeping pace with how attackers actually operate today? Barely and only if you are proactive. By Roy Alves, sales director of J2 Software Today’s attackers are not the amateurs of the past. They are stealthy, adaptive and exploiting the very...
Your cybersecurity strategy is probably wrong – and how to fix it
Recently, I asked a room full of business leaders who among them would rate their cybersecurity posture as "excellent”. Only one hand went up. When I dropped the ranking to "good," just a few more hands were tentatively raised. By Kudakwashe Charandura, head of...
How to delete your digital footprint from the Internet
Users’ digital footprints have been building up for years. Social media accounts, old comments, carelessly posted photos, message boards, and old marketplace listings — everything that each individual user has ever shared online remains there, potentially causing...
The autonomous security revolution: Why businesses are taking to the skies
For decades, security operations have relied on a familiar combination of fixed cameras, perimeter fencing and human patrol teams. By Ruan Botha, DJI project manager at Rectron While these remain important, they have inherent limitations. Static cameras create...
Cybersecurity – ignore it at your own peril
When a company as established as Jaguar Land Rover finds itself brought to a standstill by a cyberattack, it sends shockwaves through the entire business community. By Nickey Mannya, director for cybersecurity and next generation solutions at Westcon-Comstor Southern...
How to outsmart zero-day threats in a hyperconnected world
Cyber threats are evolving faster than ever. Among them, zero-day exploits stand out as one of the most unpredictable and damaging. By Avinash Gupta, head of Centre of Excellence at In2IT Technologies These attacks strike before a fix exists, leaving organisations...
Check Point adds AI Cloud Protect powered by Nvidia BlueField
Check Point Software Technologies is working with Nvidia to deliver an integrated security solution built for AI factories. AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference...
What the history of cyber threats can teach us about AI attacks
The greatest threat in cybersecurity right now isn’t the artificial intelligence of the future; it’s the human oversight of the past. For all the sophistication of modern attacks, the most devastating breaches are often echoes of old mistakes written in new code. By...