The business case for MDR: Protecting clients when threats don’t sleep
For many South African organisations, the real test of their cybersecurity resilience is not whether they have the right tools in place, but whether anyone is actively watching their environment when attackers make their move and can respond immediately when something...
‘I have nothing to hide’ is the most comfortable lie in cybersecurity
International Data Privacy Day (28 January) usually brings a wave of advice about passwords and privacy settings. Most of us tune it out. We fall back on the comfortable, dangerous cop-out: "I am boring. I have nothing to hide." Richard Ford, chief technology officer...
Why you must train your AI agents just as hard as your employees
As Data Privacy Day approaches (28 January 2026), the conversation around protecting information has shifted yet again. For years, the mantra was simple: train your people. But in 2026, the workforce has expanded. We have arrived at a point where we are managing the...
Annual job hopping makes for a grim cybersecurity season
Many South Africans will be switching jobs come January and February after year-end bonuses and some post-holiday reflection. By Heino Gevers, senior director of technical support at Mimecast SA And, while HR departments are geared up to contend with the expected...
In fraud, we need to accept that seeing is no longer believing
By Richard Ford, group chief technology officer of Integrity360, outlines this scenario: You answer the phone. It is your daughter. You know it is her because you recognise the panic in her voice. She has run out of petrol in an area she doesn’t know; her phone is on...
Using AI to protect data is crucial
The cybersecurity landscape is rapidly changing, with hackers increasingly utilising artificial intelligence (AI) to carry out sophisticated attacks on their targets, writes Hemant Harie, group chief technology officer at Data Management Professionals South Africa. To...
Axis Communications signs CISA Secure by Design pledge
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling its commitment to upholding and transparently communicating the cybersecurity posture of its products. A voluntary pledge...
Kaspersky enables independent transparency, accountability assessment
Kaspersky has released Protection beyond detection: Why trust and transparency decide your cybersecurity future, a new whitepaper based on an independent transparency and accountability assessment of 14 leading cybersecurity vendors. Kaspersky emerged as one of the...
Cisco debuts integrated AI security and safety framework
AI is no longer an experimental capability or a back-office automation tool: it is becoming a core operational layer inside modern enterprises. The pace of adoption is breathtaking. By Amy Chang, AI threat research and security team lead at Cisco Yet, according to...
Excuse me while I slip on past your security
Attackers are bypassing the very tools designed to prevent them from gaining access to the business, writes Richard Frost, head of technology solutions and consulting at Armata Cyber Security. AI-powered phishing has become the most virulent security threat to the...
Beyond the gate: access control works with physical barriers
In an age of smart homes, mobile alerts and cloud-connected cameras, it is tempting to believe that security has become purely digital. Yet, when it comes to protecting South African homes, estates and small businesses, true security still begins and ends with...
Hexnode expands into Africa
Hexnode, the enterprise software division of Mitsogo, has released Hexnode XDR, its extended detection and response platform that underpins its effort to strengthen cyber resilience across African organisations. Across Africa, cyber threats continue to escalate in...