Align cybersecurity with ESG for sustainable security
As organisations navigate an increasingly complex digital landscape, the convergence of cybersecurity and Environmental, Social, and Governance (ESG) principles has emerged as a critical consideration. By Ryan Boyes, governance, risk and compliance officer at Galix...
To keep critical data safe, open a gap
South African organisations are becoming increasingly vigilant when it comes to addressing the growing cyberthreat landscape. In fact, more local companies are prioritising cyber risk mitigation when compared to the global average. By Michael Langeveld, head of...

How GenAI is leaking companies’ secrets
Beneath the surface of GenAI’s outputs lies a massive, mostly unregulated engine powered by data – your data. And whether it’s through innocent prompts or habitual oversharing, users are feeding these machines with information that, in the wrong hands, becomes a...

NEC XON, Palo Alto Networks unite to unlock ROI
NEC XON, a newly certified Palo Alto Networks Diamond Partner, has unveiled its platform-led cybersecurity strategy designed to maximise return on security investment (ROI) for enterprise customers across Africa and beyond. “Tool sprawl is one of the biggest drivers...
Check Point delivers brand office firewall
Check Point Software Technologies has announced major advancements to its family of Quantum Force Security Gateways. All Quantum Force Security Gateways for the data center and perimeter are receiving a 15%-25% performance boost in threat prevention throughput –...
SIEM or endpoint security first for small business cyber defence?
The cyber threat landscape is a minefield, and for small businesses with limited resources, deciding where to invest in security can feel overwhelming. By Dillon Gray, chief operating officer at IPT Recent data from the Arctic Wolf 2025 Threat Report highlights the...

The often-overlooked Achilles heel of local cyber defence
Though the world of cybersecurity is perpetually shifting, one truth has remained constant: humans are generally the weakest link in an organisation's defence. Despite this long-standing flag, a significant cybersecurity awareness gap persists in South Africa, writes...

When AI passes a Turing Tests it goes beyond a human problem
In a public online Turing Test, researchers at the University of California San Diego found that the best-performing GPT-4 prompt passed nearly half the time – outperforming older models, but still behind the human baseline of 66%. As AI becomes better at mimicking...
NordVPN launches post-quantum encryption across all its applications
NordVPN has launched post-quantum encryption (PQE) support for all its VPN applications. The first iteration of post-quantum cryptography was implemented on the NordVPN Linux application last year. In 2025, NordVPN also rolled out its PQE feature for Windows, macOS,...
Predict and prepare for future financial crime
What if the next fraudster you face isn’t even a real person? With digital transformation accelerating and cybercriminals growing more sophisticated, the face of financial crime is evolving, writes By Amritha Reddy, senior director of fraud solutions at TransUnion...

Quantum computing and cybersecurity: A ticking clock or distant threat?
The imminent impact of quantum computing will be explored at the 20th annual ITWeb Security Summit in Johannesburg and Cape Town. Qubits, entanglement, superposition… Understanding the principles and possible impact of quantum computing can be overwhelming even for...
North African communications still highly targeted by DDoS sttacks
The ICT sector in the countries of North Africa is well developed, with Morocco leading the continent in Internet usage at 92,2%, followed by Libya at 88,5% and Tunisia at 84,9%. It should come as no surprise then that the region’s ICT sector also recorded significant...