AI could help combat the deepfake crisis
The past 18 months have reshaped the global fraud landscape. Once dismissed as science-fiction novelties, deepfakes and AI-driven scams are now mainstream threats, infiltrating financial systems, digital commerce, and even politics. According to TransUnion’s latest...
Trend Micro launches agentic SIEM
Trend Micro has announced new agentic AI technology designed to solve the traditional pain points associated with Security Information and Event Management (SIEM). When combined with Trend’s digital twin capabilities it will help to transform security operations by...
AI, social media and surveillance – who has access to your face?
Your face defines who you are, but in the age of AI and social media, your facial features can be used against you. This was seen with the recent Coldplay ‘kiss cam’ scandal, where social media users were able to uncover the offending CEO and the company’s Chief...
Mind your password – and other cyber vulnerabilities
Passwords provide access to our digital identities, enabling us to bank online, order products, and communicate with potential customers via social media. A secure password, or even better, two-factor authentication, is therefore crucial for keeping your online...
How to access business information securely
A recent Kaspersky survey entitled “Cybersecurity in the workplace: Employee knowledge and behaviour”, showed that professionals surveyed in South Africa, use multiple devices for work: along with a computer, 44,8% of local respondents also use a mobile phone, and...
Trust nothing, verify everything: Zero Trust is essential for cloud security
The shift to remote work and cloud storage has rendered traditional security strategies, designed for a world of office buildings and centralised networks, ineffective. By: Kumar Vaibhav, lead senior solution architect: cybersecurity at In2IT With users working...
Addressing concerns over biometric authentication
Biometrics, particularly face biometrics, continue to be adopted as a method of identity verification (IDV) across multiple sectors in South Africa. By Lance Fanaroff, co-founder and chief strategy officer of iiDENTIFii While the technology promises greater security...
Could 15 March 2029 be D-Day for cybersecurity in your organisation?
The 15th of March is etched in history as the day when Julius Caesar met his end at the hands of the senators of Rome, and it's about to become even more significant. "Beware the Ides of March," a soothsayer tells Caesar in Shakespeare's play, and since then, the...
Sovereign SASE a new model for data-sensitive enterprises
Secure access service edge (SASE) is a powerful model for delivering security services closer to users and applications. By Nirav Shah and Andres Herrera at Fortinet But for many organisations, especially in healthcare, government, financial services, and defense,...
Recognition for Check Point Software
Check Point Software Technologies has been recognised for the second consecutive year as one of the World’s Best Companies of 2025 by TIME and Statista. Check Point is featured on the list due to its strong employee satisfaction, revenue growth, and sustainability...
For effective attack surface management, think like an attacker
While there’s a lot of talk around attack surface management (ASM) it doesn’t always clarify for businesses how they should approach this crucial matter. By Christo Coetzer, director and CEO at BlueVision Firstly, it’s important to emphasise that ASM not a technical...
Exabeam extends insider threat detection to AI agents
Exabeam has announced the integration of Google Agentspace and Google Cloud’s Model Armor telemetry into the New-Scale Security Operations Platform. The integration gives security teams the ability to monitor, detect, and respond to threats from AI agents acting as...