Navigating today’s cloud security challenges Issue 1 2025, Infrastructure While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.
The algorithm of trust Issue 1 2025, AI & Data Analytics Artificial intelligence is not just enhancing threats, it is providing organisations with a smart line of agile and detectable defence.
Empower individuals to control their biometric data Issue 1 2025, Access Control & Identity Management, Security Services & Risk Management What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.
Identity is a cyber issue SMART Access & Identity 2025, Access Control & Identity Management Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.
On the ball or unaware Issue 1 2025, Technews Publishing, Security Services & Risk Management Whether an organisation is operating at a high level of information security maturity or has dangerous vulnerabilities that could put an entire business at risk, advanced, strategic penetration testing can uncover its true state of IT security.
A winning combination for modern cybersecurity Issue 1 2025, Security Services & Risk Management Companies are compelled to comply with legislative mandates and, more importantly, implement appropriate security measures for their customers and their most valuable asset – their data.
The rise of autonomous data recovery Issue 1 2025, Infrastructure Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.
Identity and authentication SMART Access & Identity 2025, Technews Publishing, SMART Security Solutions, Access Control & Identity Management, Security Services & Risk Management Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.
Stay safe while using AI assistants Issue 1 2025, Kaspersky, News & Events, AI & Data Analytics The new DeepSeek AI assistant has attracted a lot of attention, including the interest of cybercriminals. Kaspersky experts have detected scam activity related to it.
AI-powered cyber threats drain security budgets Issue 1 2025 Research shows that 60% of IT directors strongly agree that the Metaverse, AI and machine learning will drive more cyberattacks, while only one in three believe their organisation understands Web3 cyber risks.
Get ready for bigger, bolder attacks Issue 1 2025 While threat actors continue to rely on many classic tactics that have existed for decades, FortiGuard Labs’ threat predictions for the coming year largely focus on cybercriminals embracing bigger, bolder, and—from their perspectives—better attacks.
Can we really fight AI cybersecurity threats with more AI? Issue 1 2025, Infrastructure In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry but a pressing global concern
From QR code to compromise December 2024, News & Events A new attack vector involves threat actors using fraudulent QR codes emailed in PDF attachments to bypass companies' phishing security measures by requiring users to scan the code with their mobile phones.
Organisations fear AI-driven cyberattacks, but lack key defences December 2024, Kaspersky, News & Events, Training & Education A recent Kaspersky study reveals that businesses are increasingly worried about the growing use of artificial intelligence in cyberattacks, with 56% of surveyed companies in South Africa reporting a rise in cyber incidents over the past year.
Vodacom Business unveils new cybersecurity report December 2024, IoT & Automation Cybersecurity as an Imperative for Growth offers insights into the state of cybersecurity in South Africa, the importance of security frameworks in digital resilience and the latest attack methods adopted by cyberattackers.
Smart surveillance and cyber resilience December 2024, Axis Communications SA, Surveillance, Government and Parastatal (Industry), Facilities & Building Management South Africa’s critical infrastructure sector has to step up its game regarding cybersecurity and the evolving risk landscape. The sector has become a prime target for cybercriminals on top of physical threat actors, and the consequences of an incident can be far-reaching.
NIS2 compliance amplifies skills shortages and resource strain November 2024, Security Services & Risk Management A new Censuswide survey, commissioned by Veeam Software reveals the significant impact on businesses as they adapt to this key cybersecurity directive, with 95% of EMEA businesses siphoning other budgets to try and meet compliance deadline.
Cybersecurity needs 4,7 million professionals December 2024 Despite all the efforts organisations worldwide put into preventing cyberattacks, global cybercrime has snowballed to $9,2 trillion in 2024 and is expected to grow by another 70% to $15,6 trillion by the end of a decade.
Autonomous healing systems are the future December 2024, Infrastructure, AI & Data Analytics Autonomous healing software, an emerging technology, is gaining traction for its potential to transform how organisations manage software maintenance, security, and system performance.
Understanding South Africa’s Cybercrimes Act December 2024, Security Services & Risk Management The Cybercrimes Act No.19 of 2020 is a comprehensive legislative response to the evolving landscape of cyberthreats in South Africa. Its effectiveness, however, relies on enforcement, which relies on implementation, international cooperation, and collaboration between the public and private sectors.