South Africa needs to become more stringent with its cyber security...

0
South Africa's vulnerability to cyber crimes and overall attitude to cyber security must be urgently addressed if the country has any ambitions to become...

Fixing SA’s Cybersecurity: Insights and comment on the CSIR’s Cybersecurity Resilience...

0
Fixing SA's Cybersecurity: Insights and comment on the CSIR's Cybersecurity Resilience Report Only half of SA's public sector organisations conduct daily cyber threat checks, and...

The 2025 cybersecurity outlook: How AI is key to digital defence...

0
We are on the precipice of an unprecedented shift that is reshaping the cybersecurity industry and how organisations tread through the digital landscape. In...

Why endpoint security still anchors cyber resilience in Africa

0
JOHANNESBURG – December , 2025 - Africa's endpoint security market is growing rapidly – and for good reason. Statista projects revenue in this segment to reach US$183.29...

Boosting South Africa’s cybersecurity with improved broadband infrastructure

0
In South Africa, the tale of broadband infrastructure is one of growth but also of challenges. Despite strides made to broaden access and enhance...

Building a framework for effective, agile endpoint security

0
JOHANNESBURG – January 16, 2024 - The mitigation of endpoint security risks has come increasingly under the spotlight over the past few years, due chiefly...

Create order from chaos

0
by Brandon Rochat, Cybereason regional sales director for Africa The task of managing and interpreting vast amounts of data is akin to finding a needle...

Stellar Cyber and ESET Expand Strategic Partnership to Deliver AI-driven XDR...

0
Stellar Cyber and ESET Expand Strategic Partnership to Deliver AI-driven XDR Solutions SAN JOSE, CA AND BRATISLAVA – December 18, 2024 – ESET, a global leader...

Why Empowered People Are the Real Cyber Superpower – Not a...

0
It's time to retire the tired narrative that employees are the “weakest link” in cybersecurity. They're not. They're simply the most frequently targeted. And...

Africa remains phishing prone, but ongoing training slashes risk

0
Africa remains phishing prone, but ongoing training slashes riskThe report is based on data from over 12.5 million users across 35,681 organisations in 19...

Cybercriminal for hire: The rise of Ransomware-as-a-Service

0
Cybercriminal for hire: The rise of Ransomware-as-a-ServiceRansomware-as-a-Service is surging worldwide, turning extortion into a commodity JOHANNESBURG, South Africa, November 16, 2023/ -- Ransomware attacks are...

Are women underrepresented?

0
Why women are underrepresented The latest (ISC)² Cybersecurity Workforce Study found that while gender pay gaps are closing, many female cybersecurity professionals still believe they...

8 reasons why your business may get hacked

0
8 reasons why your business may get hacked No matter how big or small, any business can be a target for cyber attackers. While some...

AI, syndicates, Nation-states: As technology converges, so too does cybercrime    

0
The globe continues to become more and more connected, and just like legitimate organisations benefit from technological advances, this interconnectedness is allowing criminal and malicious...

Digital disaster readiness: what local governments must prioritise before the next...

0
Disaster readiness often brings to mind physical emergencies like fires, storms, or floods. However, in the digital world, disasters are silent, invisible, and entirely...

MOSCOW FASHION WEEK WRAPS UP ELEVATING GLOBAL BRAND VISIBILITY

0
Johannesburg, South Africa | Thursday March 2026 - Moscow Fashion Week, which concluded in the Russian capital on March 19, is the largest platform for...

Hayo Joins the GLF to Drive Global Digital Infrastructure Innovation

0
Hayo Joins the GLF to Collaborate with International Connectivity Leaders and Drive Global Digital Infrastructure Innovation Hayo will share insights and collaborate with GLF experts...