Could 15 March 2029 be D-Day for cybersecurity in your organisation?
The 15th of March is etched in history as the day when Julius Caesar met his end at the hands of the senators of Rome, and it's about to become even more significant. "Beware the Ides of March," a soothsayer tells Caesar in Shakespeare's play, and since then, the...
Sovereign SASE a new model for data-sensitive enterprises
Secure access service edge (SASE) is a powerful model for delivering security services closer to users and applications. By Nirav Shah and Andres Herrera at Fortinet But for many organisations, especially in healthcare, government, financial services, and defense,...
Recognition for Check Point Software
Check Point Software Technologies has been recognised for the second consecutive year as one of the World’s Best Companies of 2025 by TIME and Statista. Check Point is featured on the list due to its strong employee satisfaction, revenue growth, and sustainability...
For effective attack surface management, think like an attacker
While there’s a lot of talk around attack surface management (ASM) it doesn’t always clarify for businesses how they should approach this crucial matter. By Christo Coetzer, director and CEO at BlueVision Firstly, it’s important to emphasise that ASM not a technical...
Exabeam extends insider threat detection to AI agents
Exabeam has announced the integration of Google Agentspace and Google Cloud’s Model Armor telemetry into the New-Scale Security Operations Platform. The integration gives security teams the ability to monitor, detect, and respond to threats from AI agents acting as...
Cyber resilience with Dell PowerProtect
In today’s hyper-connected world, cyber threats are no longer just a possibility they’re an inevitability. Organisations across industries are grappling with increasingly sophisticated attacks that disrupt operations, compromise sensitive data and erode trust. By Musa...
What if your staff’s AI chats are hacked?
The rise of generative AI (GenAI) has changed how we work, live, and create. By Richard Ford, chief technology officer at Integrity360 For many employees, tools like ChatGPT and Copilot have become go-to assistants for everything from drafting emails and summarising...
Could gamification build better habits and protect users?
Traditional cybersecurity and compliance training can be dull as dishwater, which can lead to poor engagement and low retention among employees. Gamification, if done well, offers a refreshing alternative, transforming boring modules into interactive experiences that...
Addressing digital illiteracy is critical for cyber resilience
Every year on 8 September, International Literacy Day reminds us of the transformative power of reading and writing. But there’s another form of literacy that is just as vital: digital literacy, writes Martin Potgieter, regional chief technology officer at...
Fraud prevention takes centre stage
Fraud is no longer a peripheral concern raised only in compliance meetings - it has become a headline issue at major business gatherings. This year’s CPT Business Summit, Seamless Africa and the ACFE conference all placed fraud prevention at the heart of their...
The new breed of cybercrime targeting our digital workforce
My retired parents, looking to supplement their pensions, have taken to exploring online opportunities. They represent a generation characterised by hard work and determination, yet less attuned to the digital sleight of hand that underpins so many internet schemes....
Beware the BYOD blind spot: Personal devices are a complicated weak link
Up to 84% of organisations globally practise bring your own device (BYOD) in some form, but only half of them officially allow it, according to a recent report. While the convenience and cost saving of employees’ using their own personal devices for work is...