How to navigate the fusion of GenAI and digital defence
The convergence of Generative AI (GenAI) and cybersecurity has emerged as a critical battleground amid ongoing digital transformation. Mandla Mbonambi, CEO of Africonology, asserts that in this dynamic intersection, cybersecurity professionals stand at the forefront,...
Deception technology crucial to unmasking the silent theft of data
The "silent theft" of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation. By Iniel Dreyer, MD of Data...
Why does your business need endpoint protection?
In today's world, where digital technology is everywhere, keeping our online information safe is more important than ever. For businesses, this means paying special attention to something called "endpoint protection". But what is an endpoint? Simply put, an endpoint...
Are identity platforms the solution to deepfakes?
Detecting deepfakes or training vigilance has a limited impact on fighting deepfake fraud. But identity platforms can help future-proof us against this threat, writes Daniel Robus, chief revenue officer at Contactable. In early January, an employee at an undisclosed...
Ramp up defences to combat rising cyberthreats
The rise of cyberattacks using old tricks and proven methods is expected to continue. Criminal organisations are relentlessly seeking access to your systems, aiming to exploit vulnerabilities in your environment and disrupt your supply chain. By John Mc Loughlin, CEO...
Avoid job scams and find a job you love
As the working year unfolds alongside Valentine's season, many South Africans are seeking a different kind of love- a fulfilling career, despite persistently high unemployment figures. Just like the dating world, the task of finding the perfect match can be...
Identity is at the core of Zero Trust
In an age marked by an unprecedented surge in cyberthreats and data breaches, the importance of cybersecurity has reached new heights. Organisations worldwide are grappling with a mounting tide of cybercrime, with estimates from Cybersecurity Ventures projecting that...
New year … same old scams
Beware of scammers looking to take your hard-earned cash and private information, warns Momentum Metropolitan's cybersecurity team. The reality is that fraud and scamming is increasing at an alarming rate. According to the Southern African Prevention Service (SAFPS),...
Adversary-in-the-middle attacks make a comeback
In the dynamic realm of cybersecurity, threats often disappear temporarily, only to evolve and reappear in more sophisticated forms. By Divan de Nysschen, cybersecurity architect at NEC XON One such resurgence is the Adversary-in-the-Middle (AiTM) attack, a potent...
Digital citizenship in the smart city era
What is a smart city? For many, the answer is technology. A smart city is, by definition, a technologically modern urban area that uses different types of electronic methods and sensors (sometimes hundreds or thousands) to collect specific data. By Bertus Engelbrecht,...
Cybersecurity luminaries join forces with Commvault to define cyber resilience
Commvault has announced that cybersecurity experts across a host of industries -- from security to public sector to technology -- have joined the Commvault Cyber Resilience Council. Council members will advise Commvault on emerging security trends and cyber threats as...
The power of unified cloud protection
Security Service Edge (SSE) is poised to play a pivotal role in modern businesses by enhancing security, ensuring secure access to cloud services, improving network performance, optimising bandwidth utilisation, and enabling cost efficiency and scalability. By John Mc...