Unseen cyber enemies linger in the networks of SA’s most vulnerable sectors
Advanced persistent threats (APTs) don’t crash into networks with noise – they slip in silently, lie in wait, and stay there for months or even years. Their goal isn’t quick disruption or petty theft, but prolonged, covert access that allows them to spy, steal, and...
Preparedness is a competitive advantage in cybersecurity
In 2025, several prominent South African companies faced the all-too-common reality of a cyberattack. Some took days to respond, with their systems offline and reputations on the line. Others, though fewer in number, recovered quickly, communicated clearly, and...
Could retrospective analysis be a secret weapon against APTs?
Rapid digital transformation is most definitely creating vast new opportunities across Africa, but, at the same time, it’s also opening up a larger attack surface for threat actors to exploit. In this environment, one capability proving to be a game-changer for local...
Trend Micro adds digital twin technology
Trend Micro has unveiled a new cyber resilience model that reinvents how enterprises approach proactive security. Trend’s Digital Twin capabilities will empower enterprises to simulate real-world cyber threats, validate their defenses, and adapt policies in real time...
Your WiFi router is about to start watching you
Imagine this: your WiFi router knows when you've fallen down the stairs, whether you're having trouble breathing, and exactly how many times you've visited the loo today. By Paul Colmer, executive committee member of WAPA It can also detect when your teenager is...
What businesses should be doing instead of buying more tech
A year after law enforcement paraded the takedown of LockBit as a victory for cybersecurity, the harsh reality has set in: ransomware didn’t retreat - it metastasised. The criminals didn’t stop; they just got smarter, writes John Mc Loughlin, CEO of J2 Software. Now,...
Vishing awareness live in Kaspersky ASAP portfolio
Kaspersky has introduced a new module on vishing (voice phishing) to its ASAP (Automated Security Awareness Platform). Vishing has become a major vector for corporate fraud. For example, AIB saw a 79% year-on-year increase in vishing attacks in early 2025, including a...
The rise of the shadow employee
Imagine a marketing manager who left a company six months ago, taking their personal laptop with them. On it, unbeknownst to anyone, was a cached login to a shared cloud drive containing sensitive client proposals and campaign strategies – access that was simply...
Women aren’t just joining the cybersecurity industry, they’re redefining it
On 9 August, South Africa honours the women who, in 1956, marched in solidarity against injustice: 20 000 strong, united by courage and determination. Nearly seventy years later, their spirit endures, inspiring women in every sphere of life. By Jaya Khatri, HR...
Trend Micro, Google Cloud advance AI-driven security
Trend Micro has announced the expansion of its strategic alliance with Google Cloud, bringing together cybersecurity expertise and cloud innovation to secure the connected world through a multi-cloud, AI-first environment, supporting sovereignty requirements,...
An enterprise security perspective on skipping software updates
Is the humble software update the unsung hero of modern enterprise security? It certainly doesn’t get the attention it deserves. By Valencia Karageorgiades, Technology Architect at SAP Africa Modern security teams are consumed with identity and access management,...
Cybersecurity training is the smartest investment you can make
In an age where data breaches, ransomware attacks, and phishing scams are daily threats, businesses can no longer afford to view cybersecurity training as a checkbox exercise. Instead, it should be regarded as a strategic investment with measurable returns. But how...