Rethinking wide-area surveillance for Africa
In Africa’s diverse and often unpredictable environments, surveillance systems face challenges that go far beyond simple camera placement. By Leandro da Cunha, surveillance BU executive at Duxbury Networking From sprawling industrial facilities and logistics hubs to...
A PCI DSS expert the best defence against fraud as a service
Cybercrime has undergone a structural shift. What was once a fragmented underground economy built around specialised skills has evolved into a scalable, on-demand commercial ecosystem. By Johannes Briel, senior cyber security specialist at Galix Today,...
Kaspersky launches OT calculator
Kaspersky’s new online tool has been specially developed for industrial organisations to assess the potential costs associated with insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management...
Extra protection needed for high-value data
As artificial intelligence (AI) accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent. This is according to...
Ransomware in 2025 and what to expect in 2026
The economic toll of ransomware could be staggering, writes Fabio Assolini, head of research centre: Americas and Europe, Global Research & Analysis Team at Kaspersky. VDC Research and Kaspersky conducted an estimation which showed that in the manufacturing sector...
The business case for MDR: Protecting clients when threats don’t sleep
For many South African organisations, the real test of their cybersecurity resilience is not whether they have the right tools in place, but whether anyone is actively watching their environment when attackers make their move and can respond immediately when something...
‘I have nothing to hide’ is the most comfortable lie in cybersecurity
International Data Privacy Day (28 January) usually brings a wave of advice about passwords and privacy settings. Most of us tune it out. We fall back on the comfortable, dangerous cop-out: "I am boring. I have nothing to hide." Richard Ford, chief technology officer...
Why you must train your AI agents just as hard as your employees
As Data Privacy Day approaches (28 January 2026), the conversation around protecting information has shifted yet again. For years, the mantra was simple: train your people. But in 2026, the workforce has expanded. We have arrived at a point where we are managing the...
Annual job hopping makes for a grim cybersecurity season
Many South Africans will be switching jobs come January and February after year-end bonuses and some post-holiday reflection. By Heino Gevers, senior director of technical support at Mimecast SA And, while HR departments are geared up to contend with the expected...
In fraud, we need to accept that seeing is no longer believing
By Richard Ford, group chief technology officer of Integrity360, outlines this scenario: You answer the phone. It is your daughter. You know it is her because you recognise the panic in her voice. She has run out of petrol in an area she doesn’t know; her phone is on...
Using AI to protect data is crucial
The cybersecurity landscape is rapidly changing, with hackers increasingly utilising artificial intelligence (AI) to carry out sophisticated attacks on their targets, writes Hemant Harie, group chief technology officer at Data Management Professionals South Africa. To...
Axis Communications signs CISA Secure by Design pledge
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling its commitment to upholding and transparently communicating the cybersecurity posture of its products. A voluntary pledge...