
Stay ahead of threats with seamless integration
The consequences of a data breach can be catastrophic, both for businesses and their customers, writes Graham Brown, country manager for SA/SADC at Commvault. At the same time, the value of data as a critical business asset is something enterprises need to harness to...
Sophos completes Secureworks acquisition
Sophos and Secureworks® (NASDAQ:SCWX), two global cybersecurity pioneers that have innovated and redefined services and technology solutions for defeating cyberattacks, today announced the completion of Sophos has completed its acquisition of Secureworks in all-cash...

What level of cybersecurity maturity are you?
As cyberattacks reach unprecedented levels, Chief Information Security Officers (CISOs) are increasingly burdened with the responsibility of safeguarding their organisations. By Graham Brown, country manager for SA/SADC at Commvault Recent research indicates that the...
The hidden cost of convenience
In light of Data Privacy Day last week, Kaspersky examines on the often-overlooked privacy trade-offs involved with using popular, everyday apps. These include social media apps, but also others such as e-commerce apps, fitness and health tracking apps. While these...
The role of data in modern business security
If data sits at the heart of the business, then observability is the game changer that transforms that data into value and security efficiency, writes Cameron Losco, GM: cybersecurity at DR Insight. The global data observability market is expected to grow at a...

Human risk, AI, governance top cyber risks
As advancements in artificial intelligence (AI) and other new technologies evolve, cyber threats have become increasingly complex. Mimecast has unveiled its top cybersecurity predictions for 2025, identifying three critical areas of focus - Human Risk, Artificial...
How to survive – and learn from – a cyberattack
A recent study by South African cybersecurity firm Nclose revealed a sobering statistic: over 60% of businesses surveyed suffered at least one ransomware attack in the past two years, with 12% enduring six or more such attacks. By Javvad Malik, lead security awareness...

Security Janus: two faces of DCAP systems
Sergio Bertoni, leading analyst at SearchInform, unpacks what DCAP systems are, and how they can be used to protect data. DCAP for dummies On the one hand, various DCP/DAG systems aren’t magic unicorns. A lot of companies use them on the daily basis. The first...
Stay safe while using AI assistants
The new DeepSeek AI assistant has attracted a lot of attention in recent days. Kaspersky experts have also detected scam activity related to it. Due to high numbers of new users and an alleged cyberattack on DeepSeek, there are glitches in the registration process on...

How AI will impact every aspect of computing in 2025
During 2025, the rapid evolution of artificial intelligence (AI) is set to dramatically reshape the cyber security landscape. By Dan Karpati, vice-president of AI Technologies As an AI and cyber security expert, I foresee several key developments that will...
How Microsoft Intune aids IT security
With artificial intelligence (AI) changing the way industries work, IT teams are under increasing pressure to find a balance between embracing new technologies and keeping systems safe. While AI promises to enhance efficiency and decision-making, its rise also...
Lessons from 2024 cybersecurity breaches
In 2024, nearly six out of every 10 businesses experienced a cyberattack. The same research revealed that 70% of these attacks led to data encryption, with ransom demands increasing fivefold. Most concerningly, 32% of cyberattacks worldwide were attributed to...