Welcome to the new cyber battleground
The Israel–Iran war has moved at a rapid pace in terms of kinetic warfare. What is also a new development is the speed at which this conflict rapidly expanded beyond traditional warfare, evolving into a complex cyber conflict, writes Dr Carl Windsor, chief information...
Upgrade your PCs to upgrade security
The latest-gen commercial AI PCs are designed to keep you ahead of cyber adversaries, writes Tony Bartlett, director of data centre compute at Dell Technologies South Africa. Did you know that a cyberattack occurs every 39 seconds? It’s no wonder. The payoff for a...
How to fight back when SA becomes a top target for cyber crime
Imagine you waking up to discover that your operations have been frozen, your mailbox is overflowing with ransom demands, and your customer data has been compromised. This is no longer just a hypothetical situation for a growing number of South African companies,...
Why hackers are targeting the underdogs
A series of recent cyberattacks has shaken South Africa's retail sector, revealing vulnerabilities that many businesses - especially SMEs - can no longer afford to ignore. E-commerce retailer OneDayOnly fell victim to a data breach by the hacking group Kill Security...
Troye debuts Arctic Wolf’s Aurora Endpoint platform
Troye has launched the Aurora Endpoint suite, a robust platform providing protection, detection, and response capabilities across every stage of an organisation’s cybersecurity maturity. Helen Kruger, MD of Troye, says with the new Aurora Endpoint platform, clients...

What to do in the first 24 hours after a ransomware attack
A ransomware attack is a nightmare scenario for any organisation. It’s disruptive, costly, and often deeply damaging to your reputation. By Richard Ford, chief technology officer at Integrity360 How you respond in the first 24 hours will determine the difference in...
Traditional defences are no longer enough
From finding creative recipes or drafting business emails to creating images for a small business’s social media posts, generative artificial intelligence (GenAI) tools like ChatGPT and Midjourney are rapidly becoming a part of our daily lives. But, along with its...

SA is a prime target for ransomware attacks
Ransomware attacks have become a significant threat to South African businesses, with the country emerging as a top target in Africa. By Kumar Vaibhav, lead senior solution architect: cybersecurity at In2IT The prevalence of these attacks is driven by a combination of...

Why real emails now look fake
In the fight against phishing, forward-thinking organisations are winning. But there’s a twist. The heightened vigilance that has empowered employees to detect suspicious emails is now creating a new dilemma: legitimate, business-critical messages are being flagged,...
Is password-based security ending?
The password is no longer a fortress in and of itself. In a landscape where attackers effortlessly bypass traditional defences, passwords have become more of a revolving door to a greater security fortress – one that needs to be built on resilience, not strength. By...
Mimecast enhances data governance, compliance across collaboration tools
Mimecast has announced a new solution with Google Workspace to enhance governance and compliance capabilities within the Workspace suite of collaboration and productivity tools. This solution enables comprehensive support for key compliance use cases such as...
Trend Micro to deliver secure infrastructure at scale
Trend Micro will deliver a suite of co-developed, pre-approved OEM appliance offerings in collaboration with Dell Technologies and Nvidia to support secure, AI-powered infrastructure solutions that scale with the needs of global enterprises. Kevin Simzer, chief...