In cybersecurity, the when is just now
Cyber-risk in South Africa is not an if anymore, it’s when the attackers get in and how equipped the company is to deal with it, writes Mohammed Pochee, product manager: security at Vox. A company can very easily find itself offline for more than a week. Attackers can...
Facebook cloning turns your profile into a weapon
Facebook cloning scams are continuing to rise, turning ordinary profiles and family photos into tools for fraud and social engineering, writes Richard Frost, head of technology solutions and consulting at Armata Cyber Security. Have you ever wondered what criminals...
Rethinking wide-area surveillance for Africa
In Africa’s diverse and often unpredictable environments, surveillance systems face challenges that go far beyond simple camera placement. By Leandro da Cunha, surveillance BU executive at Duxbury Networking From sprawling industrial facilities and logistics hubs to...
A PCI DSS expert the best defence against fraud as a service
Cybercrime has undergone a structural shift. What was once a fragmented underground economy built around specialised skills has evolved into a scalable, on-demand commercial ecosystem. By Johannes Briel, senior cyber security specialist at Galix Today,...
Kaspersky launches OT calculator
Kaspersky’s new online tool has been specially developed for industrial organisations to assess the potential costs associated with insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management...
Extra protection needed for high-value data
As artificial intelligence (AI) accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent. This is according to...
Ransomware in 2025 and what to expect in 2026
The economic toll of ransomware could be staggering, writes Fabio Assolini, head of research centre: Americas and Europe, Global Research & Analysis Team at Kaspersky. VDC Research and Kaspersky conducted an estimation which showed that in the manufacturing sector...
The business case for MDR: Protecting clients when threats don’t sleep
For many South African organisations, the real test of their cybersecurity resilience is not whether they have the right tools in place, but whether anyone is actively watching their environment when attackers make their move and can respond immediately when something...
‘I have nothing to hide’ is the most comfortable lie in cybersecurity
International Data Privacy Day (28 January) usually brings a wave of advice about passwords and privacy settings. Most of us tune it out. We fall back on the comfortable, dangerous cop-out: "I am boring. I have nothing to hide." Richard Ford, chief technology officer...
Why you must train your AI agents just as hard as your employees
As Data Privacy Day approaches (28 January 2026), the conversation around protecting information has shifted yet again. For years, the mantra was simple: train your people. But in 2026, the workforce has expanded. We have arrived at a point where we are managing the...
Annual job hopping makes for a grim cybersecurity season
Many South Africans will be switching jobs come January and February after year-end bonuses and some post-holiday reflection. By Heino Gevers, senior director of technical support at Mimecast SA And, while HR departments are geared up to contend with the expected...
In fraud, we need to accept that seeing is no longer believing
By Richard Ford, group chief technology officer of Integrity360, outlines this scenario: You answer the phone. It is your daughter. You know it is her because you recognise the panic in her voice. She has run out of petrol in an area she doesn’t know; her phone is on...