Is password-based security ending?
The password is no longer a fortress in and of itself. In a landscape where attackers effortlessly bypass traditional defences, passwords have become more of a revolving door to a greater security fortress – one that needs to be built on resilience, not strength. By...
Mimecast enhances data governance, compliance across collaboration tools
Mimecast has announced a new solution with Google Workspace to enhance governance and compliance capabilities within the Workspace suite of collaboration and productivity tools. This solution enables comprehensive support for key compliance use cases such as...
Trend Micro to deliver secure infrastructure at scale
Trend Micro will deliver a suite of co-developed, pre-approved OEM appliance offerings in collaboration with Dell Technologies and Nvidia to support secure, AI-powered infrastructure solutions that scale with the needs of global enterprises. Kevin Simzer, chief...
Arbor Cloud DDoS protection ranked Platinum
NetScout, a leading provider of enterprise performance management, carrier service assurance, cybersecurity and DDoS protection solutions, has earned top honours in the 2025 Enterprise Management Associates (EMA) PRISM report on distributed denial-of-service (DDoS)...
How to outsmart AI scammers
Artificial intelligence (AI) is everywhere. And, as much as it’s changing the world in cool ways like music, art, gaming and technological advancements, scammers are using it too, to attempt to defraud you “Fraudsters are becoming more sophisticated, and scams aren’t...
Securing SA’s AI future: why cybersecurity must lead the way
Artificial intelligence is rapidly becoming the engine room of South Africa’s economic future, writes Boland Lithebe, security lead for Accenture, Africa. Across sectors, from banking and insurance to healthcare and retail, AI systems are transforming how decisions...
What does a good cyber security incident response plan look like?
It doesn't matter how large your organisation is, you are at risk. Sooner or later cyber criminals will try to attack you. It’s not a matter of whether your organisation will face a security incident, but rather when. That's why a robust incident response plan is...
Disrupt first, ask questions later
Attackers don’t wait for board approval. They slip through a mis-configured firewall at 02:00 on a Sunday or phish a distracted employee just before quarter-end. By Ryno Le Roux, cyber operations manager at NEC XON At that moment, every control you’ve bought is judged...
AI’s growing influence in safeguarding banks and customers
Flashy artificial intelligence (AI) applications like generative art and self-driving cars might dominate today’s headlines. Ut ai and machine learning (ML) are playing a quiet background role in our lives, writes James Saunders, co-founder and chief technology...
Outdated systems are a hacker’s dream
Cybercrime is evolving faster than systems can keep up, so if your business is still sitting in the past, it’s sitting with vulnerabilities, writes Richard Frost, head of innovation and technology at Armata Cyber Security. According to the ‘Connected Business: digital...
Gesture-based IDV opens SA business to rising cyber crime
Purchasing gesture-based, low-cost identity verification (IDV) solutions to meet growing governance demands could put South African businesses at serious risk. This is according to Lance Fanaroff, co-founder of biometric identity provider iiDENTIFii. Awareness of...
Fraud warning about fake events
A new scam involving advertising fraudulent professional conferences or events using seemingly legitimate event invitations is becoming more prevalent. One such invitation included an agenda, registration details and purported to feature high-profile speakers from...