Businesses urged to strengthen security posture
Implementing a comprehensive approach to cybersecurity and data protection are the first proactive steps to strengthening the security posture of any business. Organisations such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework 2.0...
The evolution of zero trust
Around 18 months ago, I was writing about the "endless journey" to zero trust, writes Dave Russell, vice-president: enterprise strategy at Veeam. I used the word "endless" because zero trust is a mindset rather than a product or a destination - it's a target to aim...
Why modern organisations need advanced endpoint security
Security technologies have come a long way from the anti-virus and firewall solutions of the past. As data grows exponentially, traditional security measures are no longer effective. David Herselman, MD of inq South Africa Artificial intelligence (AI) is playing an...
Cybersecurity fatigue a growing risk in the age of AI-driven attacks
Although the tactics and technologies cybercriminals use have evolved over the past 20 years, phishing and other social engineering attacks are nothing new. But despite the significant amounts of time and money invested in cybersecurity training and awareness,...
Protect digital ID with phone number security
Phone numbers have evolved into essential identifiers, akin to personal IDs and crucial for logging into numerous online services ranging from social networks to banking apps. As such, control over these digits is pivotal, with their loss potentially leading to...
Collaboration, investment key to strengthening Africa’s digital payments cybersecurity
As the digital payments landscape in Africa expands, the need for robust cybersecurity measures becomes increasingly urgent. By Omotayo Ogunlade, chief technology officer at Onafriq Trust and security are foundational to financial services, and as cybercriminals...
Trend Micro debuts Inline NDR
Trend Micro has announced Inline NDR, available in the Trend Vision One platform where it improves detection and response across all security functions rather than operating as an isolated solution. NDR tools are commonly deployed in large enterprises that have many...
Digital world makes defending against more relevant
In a hyper-connected, always-on world, both citizens and businesses must develop robust, multi-layered cybersecurity strategies to combat the flourishing cybercrime ecosystem. By Michael de Neuilly-Rice, cyber security architect at NEC XON These illicit markets have...
SMEs, you are the low hanging fruit for cybercriminals
According to an IBM report, on average it takes nearly 287 days to detect and contain a data breach. A lot of damage can be done in such a long period of time. For one thing, your reputation can go down the drain along with your dream of selling this great little...
Cybersecurity an organisational responsibility given the threat from AI
While tools such as ChatGPT have caught the public imagination, artificial intelligence (AI) and machine learning (ML), a branch of AI, are now important tools in industries ranging from travel and insurance to media and finance. By Wendy Tembedza, partner, Dario...
Kaspersky named as a leader in threat intelligence
Kaspersky has been recognised as a Leader in the 2024 Spark Matrix: Digital Threat Intelligence Management by Quadrant Knowledge Solutions for the second year in a row, reaffirming its technological excellence and customer impact. According to the 'XDR and SOC...
Game over? Not with the right cybersecurity protection in place
There is an old saying which notes that "there's nothing new under the sun". Gamers today, however, might disagree, because, as computing and graphics power has grown exponentially in the last few decades, gamers around the world share in a feeling of being deeply...