SA businesses underestimate cyber risks
A figure of 2 113 cyber security threats a week sounds daunting enough but, according to experts, this may only be a fraction of the total number impacting South African companies. In a July 2025 report, Check Point Software Technologies revealed the 2 000-plus figure...
Kaspersky’s Cyber Pathways supports career development
Kaspersky’s new platform, Cyber Pathways, offers a look into the essential cybersecurity roles, skills, and tools, to empower professionals to chart their career paths with confidence. Featuring an interactive guidance test and personalised learning recommendations,...
Zero trust begins with the right security partner
As businesses move beyond traditional network boundaries, the old “castle and moat” model of security is no longer effective. In a world of hybrid work, cloud platforms and mobile devices, implicit trust within a network is a major vulnerability. By Ivaan Captieux,...
Guardz partners with Check Point Software on email security for MSPs
Guardz has announced a new strategic technology partnership with Check Point to embed Harmony Email directly into the Guardz platform. The collaboration enhances Guardz’s AI-native, unified cybersecurity platform with Check Point’s patented, inline API-based email...
Cluttered desktops are a cybersecurity nightmare
Digital hoarding poses a significant and often underestimated cybersecurity risk that extends far beyond a simple productivity issue, argues Anna Collard, senior vice-president of content strategy and CISO advisor at KnowBe4 Africa. Like a garage slowly filling with...
Securing AI agents through smarter ID management
The conversation about artificial intelligence in South Africa has shifted rapidly over the past year. By Boland Lithebe, security lead for Accenture, Africa What was once the stuff of conferences and pilot projects is now quietly embedding itself in boardrooms and...
Why attack surface management must look both inside and out
Attack surface management (ASM) has grown exponentially in recent years, evolving into a recognised market category that equips businesses with the strategies and visibility needed to protect their digital assets. By Kyle Pillay, security as a service manager at...
Cybercriminals exploit our best intentions
Cybercriminals are not only using fear and urgency to exploit their victims. Positive emotions – such as empathy, curiosity, and a desire to help – are also being exploited. This is the warning from Anna Collard, senior vice-president: content strategy and CISO...
Multi-cloud AI security: finding order in the chaos
Artificial intelligence (AI) is transforming how organisations innovate, serve customers, and operate at scale. By Avinash Gupta, head of Centre of Excellence at In2IT Technologies But when these workloads stretch across multiple cloud providers, complexity rises...
GenAI-driven cyberattacks force a shift to predictive security
The rise of generative artificial intelligence (GenAI)-driven attacks and the growing complexity of interconnected supply chains has placed South African organisations at risk. As cyberfraud becomes commoditised, with bad actors now able to carry out...
The hard truth about endpoint security: Attackers are already ahead
Is endpoint security keeping pace with how attackers actually operate today? Barely and only if you are proactive. By Roy Alves, sales director of J2 Software Today’s attackers are not the amateurs of the past. They are stealthy, adaptive and exploiting the very...
Your cybersecurity strategy is probably wrong – and how to fix it
Recently, I asked a room full of business leaders who among them would rate their cybersecurity posture as "excellent”. Only one hand went up. When I dropped the ranking to "good," just a few more hands were tentatively raised. By Kudakwashe Charandura, head of...