Next-generation data protection is critical
The value of data has increased exponentially, to the point where becoming a victim of cybercrime is no longer an if, but a when. By Kate Mollett, senior director at Commvault Africa The reality is that your environment will be breached at some point because...
Employee mistakes still the biggest cybersecurity threat
With almost 88% of data breaches being caused by an employee mistake, a strong human risk management programme with regular employee training and cybersecurity awareness is critical, writes Carey van Vlaanderen, CEO of ESET Southern Africa. Ask any cybersecurity...
How to strengthen data security for Office 365
Amid an alarming rise in ransomware attempts and cloud data security breaches globally, it's important for businesses to reassess their data protection strategies for Microsoft Office 365. Despite Microsoft's robust and secure infrastructure, businesses must not...
Individual digital identity holds potential
The way we perceive business flourishing is undergoing a paradigm shift as digital identity and consumer consent redefine the dynamics of transactions. Shanaaz Trethewey, chief operating officer of Comcorp South Africa, emphasises the pivotal role of individuals'...
Ethical hacking: when white hats turn grey
What colour hat is the hacker that just penetrated your organisation without your permission wearing? Grey? Black? White? Hacking is often seen as a black-and-white issue: either you are a malicious hacker who breaks into systems for personal gain, or you are an...
Digital immunity the next goal for cybersecurity
Amid rapid change and evolution of cyberrisk, traditional approaches to cybersecurity and cyber resilience are no longer enough to protect organisations. By Gary Jardim, sales and marketing manager at Triple4 Global A new model is emerging, in which organisations...
Reverse Engineering the most complicated cybersecurity task, Kaspersky contest finds
The latest Codebreakers competition organised by Kaspersky among cybersecurity specialists from more than 35 countries including the UAE, Saudi Arabia, Turkiye, and South Africa has revealed that reverse engineering is the most complex task performed by InfoSec...
Why zero trust helps unlock security resilience
Speaking to many CISOs, it's clear that many security executives view zero trust as a journey that can be difficult to start, and one that even makes identifying successful outcomes a challenge. Simultaneously, the topic of security resilience has risen up the C-level...
Ensuring security in the AI gold rush
The business world has also been caught up in the Artificial Intelligence (AI) fever, with discussions taking place in boardrooms and C-suites about how to leverage AI tools. By Kate Mollett, senior director of Commvault Africa Employees in many companies are...
The critical role of AI in safeguarding the digital realm
The rapid growth of data and technology infrastructures in our digital era has opened us up to the possibility of sophisticated cybersecurity threats. However, amidst these challenges, artificial intelligence (AI) offers a glimmer of hope by providing advanced tools...
Zero trust: a paradigm shift in cybersecurity
In today's digital landscape, organisations face a constant barrage of cyber threats. Traditional perimeter-based security measures are no longer sufficient in safeguarding sensitive data and critical assets. As businesses continue to evolve and adopt cloud-based...
Cybersecurity has a massive skills shortage – and it’s worse in SA
As economies around the globe embrace digital transformation, a massive cybersecurity skills gap has emerged. In fact, a report released late last year suggests that an additional 3,4-million people need to be trained in cybersecurity and then hired to have any hope...