Integration is the key to smarter surveillance
Security threats are evolving and businesses in South Africa can no longer rely on standalone surveillance systems, writes Leandro da Cunha, surveillance business unit lead at Duxbury Networking. According to recent market projections, the local security industry is...

DLP helps to enhance and empower cybersecurity posture
DLP systems are preventing data leaks. It’s a rule of thumb. But DLP can do more than just that, writes Sergio Bertoni, leading analyst at SearchInform. DLP systems are the part of information security infrastructure. They monitor data in motion on endpoints and over...
As technology converges, so does cybercrime
The globe continues to become more and more connected, and just like legitimate organisations benefit from technological advances, this interconnectedness is allowing criminal and malicious networks to flourish too. By Anna Collard, senior vice-president: content...
Securing Africa’s manufacturing sector against cybercrime
Connectivity and automation have undeniably revolutionised the manufacturing sector, boosting efficiency and productivity. However, they have also introduced significant vulnerabilities, leaving the industry increasingly exposed to cybersecurity threats. By Andre...
From EPP to AI: the future of endpoint security for businesses
Endpoint security is a critical pillar of cybersecurity, especially for South African businesses, which are becoming prime targets for cybercriminals. By Kumar Vaibhav, lead senior solution architect: cybersecurity at In2IT Endpoint security involves safeguarding...
Avoid the trap of deepfake scams
In today’s digitally driven world, we are inundated with cyber scams, both direct and indirect, daily. As cybersecurity technology evolves to block traditional attacks, cybercriminals are increasingly turning to social engineering - manipulative psychological tactics...
The hidden dangers of increasingly advanced AI assistants
As the use of AI assistants in South Africa continues to grow, so do the risks. Zaheer Ebrahim, Trend Micro’s solutions architect for the Middle East and Africa, unpacks some of the emerging threats. The evolution of AI assistants over the past few years is nothing...
Intrusion protection helps secure O&G ops in Africa
Across Africa, oil and gas represent a seismic economic shift. By Rudie Opperman, manager: engineering and training, Middle East & Africa at Axis Communications In South Africa, multiple developments in 2024, such as the publishing of a new petroleum bill and...

Stay ahead of threats with seamless integration
The consequences of a data breach can be catastrophic, both for businesses and their customers, writes Graham Brown, country manager for SA/SADC at Commvault. At the same time, the value of data as a critical business asset is something enterprises need to harness to...
Sophos completes Secureworks acquisition
Sophos and Secureworks® (NASDAQ:SCWX), two global cybersecurity pioneers that have innovated and redefined services and technology solutions for defeating cyberattacks, today announced the completion of Sophos has completed its acquisition of Secureworks in all-cash...

What level of cybersecurity maturity are you?
As cyberattacks reach unprecedented levels, Chief Information Security Officers (CISOs) are increasingly burdened with the responsibility of safeguarding their organisations. By Graham Brown, country manager for SA/SADC at Commvault Recent research indicates that the...
The hidden cost of convenience
In light of Data Privacy Day last week, Kaspersky examines on the often-overlooked privacy trade-offs involved with using popular, everyday apps. These include social media apps, but also others such as e-commerce apps, fitness and health tracking apps. While these...