Protect your most driven employees in the cyber age
High-performing employees are often an organisation's greatest asset, bringing dedication, expertise, and drive to their roles. However, the very qualities that make these employees exceptional – their commitment to meeting deadlines, willingness to take on...
Why SASE is the answer to multi-cloud complexity
As more organisations move applications and data into multiple cloud platforms, the challenge of managing access and securing traffic across a fragmented environment is becoming harder to ignore. By Saurabh Prasad, senior solution architect at In2IT Technologies...
Keeping AI on the right side of cybersecurity
AI now sits on both sides of the cybersecurity coin. Criminals use it to automate phishing, while defenders rely on it to spot the tiny anomalies humans miss. South African organisations might be tempted to jump in as quickly as possible, but questions of...
Kaspersky rolls out Cloud Workload Security update
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security (CWS), delivering advanced protection for hybrid and multicloud environments. Security challenges constantly pose a threat to organisations’ cloud infrastructures. In a...
Cyberattacks a serious threat to mining recovery’s green shoots
South Africa’s mining sector, long a cornerstone of the national economy, has after two consecutive quarters of decline, finally turned positive again. By Martin Fernandes, business development manager (Africa): operational technology at Fortinet With StatsSA’s...
AI could help combat the deepfake crisis
The past 18 months have reshaped the global fraud landscape. Once dismissed as science-fiction novelties, deepfakes and AI-driven scams are now mainstream threats, infiltrating financial systems, digital commerce, and even politics. According to TransUnion’s latest...
Trend Micro launches agentic SIEM
Trend Micro has announced new agentic AI technology designed to solve the traditional pain points associated with Security Information and Event Management (SIEM). When combined with Trend’s digital twin capabilities it will help to transform security operations by...
AI, social media and surveillance – who has access to your face?
Your face defines who you are, but in the age of AI and social media, your facial features can be used against you. This was seen with the recent Coldplay ‘kiss cam’ scandal, where social media users were able to uncover the offending CEO and the company’s Chief...
Mind your password – and other cyber vulnerabilities
Passwords provide access to our digital identities, enabling us to bank online, order products, and communicate with potential customers via social media. A secure password, or even better, two-factor authentication, is therefore crucial for keeping your online...
How to access business information securely
A recent Kaspersky survey entitled “Cybersecurity in the workplace: Employee knowledge and behaviour”, showed that professionals surveyed in South Africa, use multiple devices for work: along with a computer, 44,8% of local respondents also use a mobile phone, and...
Trust nothing, verify everything: Zero Trust is essential for cloud security
The shift to remote work and cloud storage has rendered traditional security strategies, designed for a world of office buildings and centralised networks, ineffective. By: Kumar Vaibhav, lead senior solution architect: cybersecurity at In2IT With users working...
Addressing concerns over biometric authentication
Biometrics, particularly face biometrics, continue to be adopted as a method of identity verification (IDV) across multiple sectors in South Africa. By Lance Fanaroff, co-founder and chief strategy officer of iiDENTIFii While the technology promises greater security...