How to survive – and learn from – a cyberattack
A recent study by South African cybersecurity firm Nclose revealed a sobering statistic: over 60% of businesses surveyed suffered at least one ransomware attack in the past two years, with 12% enduring six or more such attacks. By Javvad Malik, lead security awareness...

Security Janus: two faces of DCAP systems
Sergio Bertoni, leading analyst at SearchInform, unpacks what DCAP systems are, and how they can be used to protect data. DCAP for dummies On the one hand, various DCP/DAG systems aren’t magic unicorns. A lot of companies use them on the daily basis. The first...
Stay safe while using AI assistants
The new DeepSeek AI assistant has attracted a lot of attention in recent days. Kaspersky experts have also detected scam activity related to it. Due to high numbers of new users and an alleged cyberattack on DeepSeek, there are glitches in the registration process on...

How AI will impact every aspect of computing in 2025
During 2025, the rapid evolution of artificial intelligence (AI) is set to dramatically reshape the cyber security landscape. By Dan Karpati, vice-president of AI Technologies As an AI and cyber security expert, I foresee several key developments that will...
How Microsoft Intune aids IT security
With artificial intelligence (AI) changing the way industries work, IT teams are under increasing pressure to find a balance between embracing new technologies and keeping systems safe. While AI promises to enhance efficiency and decision-making, its rise also...
Lessons from 2024 cybersecurity breaches
In 2024, nearly six out of every 10 businesses experienced a cyberattack. The same research revealed that 70% of these attacks led to data encryption, with ransom demands increasing fivefold. Most concerningly, 32% of cyberattacks worldwide were attributed to...
Scammers take advantage of the desperate need to access cash
Revitalised from their end-of-year vacation, South Africans typically tackle the new year with gusto and renewed vigour. It is also a time when students who matriculated the year before, start the next phase of their journey as they enter into universities and...

Beyond contracts and compliance: Building trust in security
Security vulnerabilities cost companies money, clients and reputations. Partnerships build resilience, stability and agile solutions that mitigate these vulnerabilities, writes Richard Frost, head of technology and innovation at Armata Cyber Security. Cybersecurity...
Prioritise data strategies in 2025
As South African businesses navigate an increasingly data-driven world, many face the challenge of turning overwhelming amounts of information into actionable insights. Ferdinand Steenkamp, co-founder at Tregter, emphasises the urgency for companies to adopt clear,...

Social engineering is still the top cybersecurity threat
Almost 70% of data breaches involve the human element. Here’s how organisations can keep their most vital assets – their employees, their finances and their data – safe from scammers. By Anna Collard, senior vice-president: content strategy and evangelist at KnowBe4...
Mimecast achieves AI Management System Standard ISO 42001
Mimecast has achieved ISO 42001 certification through the certification body Schellman. As the world’s first AI Management Systems (AIMS) standard, ISO 42001 is an international standard that provides a framework for managing AI risks and opportunities, encourages...

Cybersecurity trends and adoption in Africa
As digital transformation accelerates across Africa and South Africa, cybersecurity has become a critical concern for governments, businesses, and individuals. The growing adoption of new technologies and the evolving sophistication of cyber threats necessitate...