SIEM or endpoint security first for small business cyber defence?
The cyber threat landscape is a minefield, and for small businesses with limited resources, deciding where to invest in security can feel overwhelming. By Dillon Gray, chief operating officer at IPT Recent data from the Arctic Wolf 2025 Threat Report highlights the...

The often-overlooked Achilles heel of local cyber defence
Though the world of cybersecurity is perpetually shifting, one truth has remained constant: humans are generally the weakest link in an organisation's defence. Despite this long-standing flag, a significant cybersecurity awareness gap persists in South Africa, writes...

When AI passes a Turing Tests it goes beyond a human problem
In a public online Turing Test, researchers at the University of California San Diego found that the best-performing GPT-4 prompt passed nearly half the time – outperforming older models, but still behind the human baseline of 66%. As AI becomes better at mimicking...
NordVPN launches post-quantum encryption across all its applications
NordVPN has launched post-quantum encryption (PQE) support for all its VPN applications. The first iteration of post-quantum cryptography was implemented on the NordVPN Linux application last year. In 2025, NordVPN also rolled out its PQE feature for Windows, macOS,...
Predict and prepare for future financial crime
What if the next fraudster you face isn’t even a real person? With digital transformation accelerating and cybercriminals growing more sophisticated, the face of financial crime is evolving, writes By Amritha Reddy, senior director of fraud solutions at TransUnion...

Quantum computing and cybersecurity: A ticking clock or distant threat?
The imminent impact of quantum computing will be explored at the 20th annual ITWeb Security Summit in Johannesburg and Cape Town. Qubits, entanglement, superposition… Understanding the principles and possible impact of quantum computing can be overwhelming even for...
North African communications still highly targeted by DDoS sttacks
The ICT sector in the countries of North Africa is well developed, with Morocco leading the continent in Internet usage at 92,2%, followed by Libya at 88,5% and Tunisia at 84,9%. It should come as no surprise then that the region’s ICT sector also recorded significant...
Honeypots a strategic layer in cyber defence
J2 Software has introduced 'Honeypot as a Service', a plug-and-play solution designed to deceive attackers, gather critical threat intelligence, and ultimately strengthen an organisation’s cyber resilience. This new approach is particularly crucial as cyberattacks...
As Africa banks the unbanked, skills gap invites threats
As African banks continue to bring financial services to millions of the unbanked, an escalating crisis is building: a severe shortage of cybersecurity skills. By Doros Hadjizenonos, regional director at Fortinet South Africa Cyberattacks now rank among the leading...

Tech won’t save your business from cyberthreats
Artificial intelligence (AI) is reshaping the landscape of information security, presenting both unprecedented opportunities and significant new threats. By Ryan Boyes, governance, risk and compliance officer at Galix While AI-driven solutions can enhance threat...
SA’s national cyber defence gap is showing – again
South African Airways (SAA) on Wednesday shared details of its preliminary investigation into the recent cyberattack on its digital systems, but it is just the latest national public entity to fall victim to an accelerating pattern of targeted breaches. By Stephen...
Meta introduces facial recognition tools
Meta is launching measures that use facial recognition technology to help detect and prevent scams and enable faster account recovery across its platforms in South Africa. The facial recognition system is designed to identify and block deceptive ads that misuse and...