Holiday hacks, Digital detoxing and Skeleton crews – 3 festive releases 

0
The end-of-year fatigue is a biological reality that cybercriminals bank on. While December is traditionally associated with winding down, for the digital underworld, it...

Why endpoint security still anchors cyber resilience in Africa

0
JOHANNESBURG – December , 2025 - Africa's endpoint security market is growing rapidly – and for good reason. Statista projects revenue in this segment to reach US$183.29...

Belgium strengthens digital partnership with Africa with ATOMNIA launch

0
Cape Town, November, 2025 – Networking and cybersecurity specialist, ATOMNIA, the Wallonia Export & Investment Agency (AWEX), and Belgian technology incubator and support organisation, IGNITY, have announced...

Tired, trusted and targeted: The new face of insider cyber risk

0
Most organisations link employee well-being to productivity, but overlook the direct correlation between high-pressure work environments and heightened cybersecurity risk. In an era of...

The diversity gap costs more than talent – it creates security...

0
Every year, industry reports tell the same story: women make up only a quarter of the global cybersecurity workforce, and that figure is likely far lower in...

Cybersecurity Awareness Month: How SA businesses can safeguard themselves

0
Cybercriminal activity in South Africa surged by 14% between July 2024 and July 2025, according to Check Point Research’s Global Threat Intelligence Report. This...

Heritage, identity, and the risk of digital mimicry

0
As South Africans recently celebrated a day of communal braais and shared national pride, our digital lives inevitably mirrored our physical ones. We posted...

Beware the BYOD blind spot: Personal devices are a complicated weak...

0
Up to 84% of organisations globally practise bring your own device (BYOD) in some form, but only half of them officially allow it, according...

Digital mindfulness as a weapon in the cyber security arsenal

0
People continue to be the primary target for cyber attackers - a growing challenge for organisations as threats escalate globally. However, by understanding why people...

Cybersecurity, gamified: Can fun actually build better habits and protect users

0
Traditional cybersecurity and compliance training can be dull as dishwater, which can lead to poor engagement and low retention among employees. Gamification, if done...

Unseen cyber enemies linger in the networks of South Africa’s most...

0
Advanced Persistent Threats (APTs) don't crash into networks with noise – they slip in silently, lie in wait, and stay there for months or...

Digital disaster readiness: what local governments must prioritise before the next...

0
Disaster readiness often brings to mind physical emergencies like fires, storms, or floods. However, in the digital world, disasters are silent, invisible, and entirely...

The cyber-secure mom: How a robust cybersecurity culture empowers working mothers...

0
As South Africa commemorates Women's Month, the conversation around workplace flexibility and empowerment is more critical than ever. However, Integrity360 cautions that without a supportive and...

Cybersecurity Trends CIOs Must Prepare for in 2026

0
Recent data highlights the urgency: ●       78% of South African companies experienced ransomware attacks in 2023, according to INTERPOL's African Cyberthreat Assessment Report 2024.Read the full report...

Cyber talent and investing in local youth development: “a no-brainer for us”

0
The MiDO Academy is a full-time training programme dedicated to stimulating inclusive economic growth in South Africa by empowering young people with vital cybersecurity skills....

Hayo Joins the GLF to Drive Global Digital Infrastructure Innovation

0
Hayo Joins the GLF to Collaborate with International Connectivity Leaders and Drive Global Digital Infrastructure Innovation Hayo will share insights and collaborate with GLF experts...