What if your staff’s AI chats are hacked?
The rise of generative AI (GenAI) has changed how we work, live, and create. By Richard Ford, chief technology officer at Integrity360 For many employees, tools like ChatGPT and Copilot have become go-to assistants for everything from drafting emails and summarising...
Could gamification build better habits and protect users?
Traditional cybersecurity and compliance training can be dull as dishwater, which can lead to poor engagement and low retention among employees. Gamification, if done well, offers a refreshing alternative, transforming boring modules into interactive experiences that...
Addressing digital illiteracy is critical for cyber resilience
Every year on 8 September, International Literacy Day reminds us of the transformative power of reading and writing. But there’s another form of literacy that is just as vital: digital literacy, writes Martin Potgieter, regional chief technology officer at...
Fraud prevention takes centre stage
Fraud is no longer a peripheral concern raised only in compliance meetings - it has become a headline issue at major business gatherings. This year’s CPT Business Summit, Seamless Africa and the ACFE conference all placed fraud prevention at the heart of their...
The new breed of cybercrime targeting our digital workforce
My retired parents, looking to supplement their pensions, have taken to exploring online opportunities. They represent a generation characterised by hard work and determination, yet less attuned to the digital sleight of hand that underpins so many internet schemes....
Beware the BYOD blind spot: Personal devices are a complicated weak link
Up to 84% of organisations globally practise bring your own device (BYOD) in some form, but only half of them officially allow it, according to a recent report. While the convenience and cost saving of employees’ using their own personal devices for work is...
Check Point is a leader in hybrid mesh firewall
Check Point Software Technologies has been named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewalls for execution and completeness of vision. "Today’s hyperconnected, highly distributed enterprise networks have expanded the perimeter and attack...
Embedding cybersecurity compliance into core operations essential for business resilience
With the value of data continually on the rise and the consequences of a breach becoming increasingly severe, cybersecurity compliance can simply no longer be an afterthought – it is a fundamental pillar of business resilience. By Ryan Boyes, governance, risk and...
Microsoft’s breach warns of a new corporate risk
The rise of generative AI has changed how we work, live, and create. For many employees, tools like ChatGPT and Copilot have become go-to assistants for everything from drafting emails and summarising reports to brainstorming creative ideas. By Richard Ford, chief...
Could gamification build better habits and protect users?
Traditional cybersecurity and compliance training can be dull as dishwater, which can lead to poor engagement and low retention among employees. Gamification, if done well, offers a refreshing alternative, transforming boring modules into interactive experiences that...
Think you’re too small to be hacked? Think again
For years, small and mid-sized enterprises (SMEs) have convinced themselves they’re “not a target”. No one’s trying to breach the corner bakery, the local law firm, or the regional logistics company - right? Wrong. By Kurt Goodall, technical director of Troye Hackers...
Unseen cyber enemies linger in the networks of SA’s most vulnerable sectors
Advanced persistent threats (APTs) don’t crash into networks with noise – they slip in silently, lie in wait, and stay there for months or even years. Their goal isn’t quick disruption or petty theft, but prolonged, covert access that allows them to spy, steal, and...