Chinese, Russian Partnerships in South Africa Should Extend to the Cyber Realm
By Staff Writer 9 September 2022If South Africa truly is in alliance with countries like Russia and China, questions really should be asked why these two allied countries refuse to support South Africa in its struggles against disinformation and... FULL STORY >
Interview with Trend Micro: Addressing gender under-representation in cybersecurity
By Ryan Noik 8 September 2022Tarryn Maitland, Regional Account Manager at Trend Micro, addresses the issue of underrepresentation of women in technology. Ryan Noik chats to her about what is impeding its progress and what Trend Micro... FULL STORY >
Chilling Netflix docuseries an important reminder to strengthen passwords
By Staff Writer 29 August 2022The Most Hated Man on the Internet shows viewers just how quickly personal data can be hacked, stolen, and exploited. FULL STORY >
AI & ML to your defence in an evolving cyber threat landscape
By Industry Contributor 26 August 2022Nowadays, threat actors are leaning on new tools and techniques to improve the efficiency of their attacks. Only artificial intelligence (AI) and machine learning move quickly enough to defend organisations in this evolving cyber... FULL STORY >
Tech trends: What the rest of 2022 has in store for the industry
By Staff Writer 24 August 2022Since the beginning of 2022, several trends have emerged as newsworthy front-runners. CTO Wayne Yan and architect Saša Slankamenac at South African specialised software development firm Dariel, take a closer look at Web3,... FULL STORY >
AI and ML reliability and security: BlenderBot and other cases
By Staff Writer 23 August 2022Kaspersky unpacks BlenderBot, chatbots and what they reveal about the reliability of machine learning and AI. FULL STORY >
The security impact of digital innovation
By Industry Contributor 19 August 2022Nclose's Stephen Osler unpacks how the rise in internet users, cybersecurity incidents and the role of the pandemic on digital transformation are creating a perfect storm of change - and how businesses can respond. FULL STORY >
Remote Desktop Protocol attacks constitute 75% of company access sold on the Darknet
By Staff Writer 16 August 2022Selling access to corporate infrastructure is one of the most popular topics on Darknet forums currently, accounting for 12% of all messages in trade forum sections analysed. FULL STORY >
Hybrid work security: A zero trust model to protect the future workplace
By Staff Writer 16 August 2022Though remote work and the hybrid working model have proven beneficial for employee well-being, inclusion and productivity, there have also been pitfalls – most notably on the security front. FULL STORY >
Apple’s new Lockdown mode: What it tells us about the mobile security landscape
By Staff Writer 15 August 2022The development and release of Apple’s new Lockdown Mode feature stresses the importance of mobile security and raises some interesting questions about the state of cybersecurity. FULL STORY >
Cyber-Wellness Means Cyber-Aware
By Staff Writer 4 August 2022Tired? Stressed? Distracted? The overwhelm of 2022 is affecting how people respond to cybersecurity threats. FULL STORY >
On the road again? Here’s how to stay cyber safe
By Industry Contributor 2 August 2022Doros Hadjizenonos, Regional Director Southern Africa, Fortinet addresses how to stay cybersafe as travel opens up again. FULL STORY >
Phishing and scams expanding significantly this year
By Staff Writer 2 August 2022Phishing and scams have hit the roof with a 234% increase in the number of detections in Africa in Q2 2022, according to Kaspersky. FULL STORY >
Newly released ESET Threat Report details how war in Ukraine has changed the threat landscape
By Industry Contributor 30 July 2022By Roman Kováč, Chief Research Officer at ESET FULL STORY >
IBM Report: South African Data Breach Costs Reach All-Time High
By Staff Writer 29 July 2022According to a recent IBM report, organisations lagging in zero trust adoption suffered higher losses while millions of Rands were saved through leveraging security AI and analytics. FULL STORY >
Most Read Articles
Have Your Say
What new tech or developments are you most anticipating this year?