What you need to know about security during loadshedding
Everything is going fine, but then the power cuts out. No problem, your employees have laptops, and backup systems keep PCs running. But what about your data? What steps have you taken to ensure your business information and application services remain available when...
Conversational AI helps fight fraud while reducing friction for customers
The risks of identity fraud remain as high as ever for consumers and banks alike. Global research from Experian shows that 58% of consumers have been a victim of online fraud or know someone who has been a victim, or both. The challenge that banks face is protecting...
Data protection is about more than just thwarting cyberattacks
The fact that ransomware and cyberattacks have become increasingly prevalent is common knowledge, and this has raised greater awareness of the need for effective data protection. By Kate Mollett, regional director of Commvault Africa However, ransomware and other data...
Hacktivism and the new age of cyber warfare
In the most recent edition of its annual Security Report, Check Point Software Technologies looked back on a tumultuous year in cybersecurity, with the boundaries between state cyber-operations and hacktivism becoming blurred as nation states act with a degree of...
I am the CEO; no, I am the CEO
One of the most successful cyber-attacks of 2022 is CEO fraud, also known as business email compromise (BEC). According to the FBI's Internet Crime Complaint Centre 2021 report, this type of attack is one of the most profitable, and one that has seen a significant...
What you need to know about deploying AI to your security stack
Is there any single technology burdened with more hype than artificial intelligence (AI)? Bb Brian Pinnock, vice-president: sales engineering EMEA at Mimeast I recently chatted to author and technologist Mo Gawdat about his book Scary Smart. In our discussion the...
How ransomware has evolved
In the most recent edition of its annual Security Report, Check Point Software Technologies looked back on a tumultuous year in cybersecurity, which saw attack levels reach an all-time high in response to the Russia-Ukraine conflict. But what can we expect in the...
HP extends remote PC management with HP Wolf Connect
HP Inc has announced HP Wolf Connect, an IT management connectivity solution that provides a highly resilient and secure connection to remote PCs, enabling IT to manage devices even when powered down or offline. Using a cellular-based network, HP Wolf Connect's robust...
Public sector must respond to online threats in real time
Despite its various structural challenges, the South African economy continues to grow. Over time, this resilience and further potential for growth has attracted the attention of global cyber criminals. In this article, Trellix SA country lead Carlo Bolzonello argues...
Humans still the number one attack vector
With insider risk on the rise and Gartner predicting that 50% of organisations will have adopted an insider risk program by 2025, J2 Software recognises that enterprise security is only achievable when the cyber strategy is underpinned by the human element. The...
Virtual burglaries to shine light on why criminals work in pairs
Immersive virtual reality (VR) technology is being used in a new study to understand how and why burglars work in pairs or groups. Students at the University of Portsmouth are being asked to become burglars for the day. Student participant pairs will be tasked with...
What AI means for digital security
As AI technology like ChatGPT evolves, so do the strategies and tactics used by cybercriminals. Steve Flynn, sales and marketing director at ESET Southern Africa, says ongoing awareness is crucial in understanding how to manage potential cybersecurity challenges posed...