Embrace the power of APIs in cybersecurity
In the fast-evolving landscape of cyber security, the intersection of technology and security has become imperative. By Sarthak Rohal, vice-president: IT services at In2IT Technologies Within this dynamic realm, application programming interfaces (APIs) have risen to...
Gut instinct can protect you against scams
The global economy has worsened, placing an ever-tightening squeeze on households. Because of this, fraudsters have become more determined, and people are more desperate to make a quick and easy buck. Fraud continues to increase for South Africans as consumers fall...
What motivates cybercriminals?
Who are the hackers plaguing businesses and individuals with a relentless cycle of attack and manipulation? By Heino Gevers , senior director: customer support at Mimecast According to Mark T Hofmann, a business psychologist that specialises in profiling...
Turn the browser into a security endpoint
As a consumer application, the web browser has long created security challenges for enterprises. The enterprise browser is set to change that, writes Patrick Evans, CEO of SLVA Cybersecurity. It is ironic to note that the browser has become the most commonly used...
Why companies should transition to ZTNA and SWG
As we celebrate Cybersecurity Awareness Month, terms like Secure Access Service Edge (SASE), Security Service Edge (SSE), Zero Trust Network Access (ZTNA), and Secure Web Gateway (SWG) are increasingly being bandied about boardroom tables across South Africa. But do...
How to tell if you’re making progress against cybercrime
From news articles to discussions at industry events, numerous examples demonstrate the far-reaching effects of cybercrime on businesses, infrastructure, and national security. By Derek Manky, chief security strategist and global vice-president: threat intelligence at...
Effective strategies to counter SA’s crime scourge
South Africans face criminal threats on all fronts. Not only does the country currently have the eighth-highest murder rate in the world but last year also ranked fifth of the global cybercrime density list, according to figures released by cybersecurity firm...
Move fast to combat the complex cyber-attack chain
Cybercriminals are transitioning from a "smash 'n grab" approach to a stealthier strategy. They now spend more time comprehending victim environments, extracting a greater amount of data, and aiming to maximise their profits per attack. This shift indicates cybercrime...
Why your boss cares if your Insta profile is hacked
Social media may seem to be far removed from the workplace, but it's become a major vulnerability for corporate networks. Cyber criminals are using company and staff social media accounts as a source of valuable information and easy access. This is the word from Tony...
Does your data hygiene pass the cleanliness test?
In today's data-driven world where every click, swipe and tap generates a trail of data, the safeguarding of information is paramount. It's no longer a case of paying a ransom, but rather defending against attacks by maintaining the hygiene of data, akin to the...
A guide to surveillance technology
Protecting a business from criminals is a necessity in South Africa, where business owners experience unique security challenges that require robust solutions. Having a comprehensive surveillance system can help to deter offenders and safeguard business assets,...

Cyberattacks push security professionals to breaking point
Research shows that attacks on businesses are growing in sophistication, putting immense pressure on the security professionals tasked with keeping work - and employees - protected. By Heino Gevers , senior director: customer support at Mimecast Based on research...