South Africa needs to become more stringent with its cyber security...
South Africa's vulnerability to cyber crimes and overall attitude to cyber security must be urgently addressed if the country has any ambitions to become...
Fixing SA’s Cybersecurity: Insights and comment on the CSIR’s Cybersecurity Resilience...
Fixing SA's Cybersecurity: Insights and comment on the CSIR's Cybersecurity Resilience Report
Only half of SA's public sector organisations conduct daily cyber threat checks, and...
The 2025 cybersecurity outlook: How AI is key to digital defence...
We are on the precipice of an unprecedented shift that is reshaping the cybersecurity industry and how organisations tread through the digital landscape. In...
Why endpoint security still anchors cyber resilience in Africa
JOHANNESBURG – December , 2025 - Africa's endpoint security market is growing rapidly – and for good reason. Statista projects revenue in this segment to reach US$183.29...
Boosting South Africa’s cybersecurity with improved broadband infrastructure
In South Africa, the tale of broadband infrastructure is one of growth but also of challenges. Despite strides made to broaden access and enhance...
Building a framework for effective, agile endpoint security
JOHANNESBURG – January 16, 2024 - The mitigation of endpoint security risks has come increasingly under the spotlight over the past few years, due chiefly...
Create order from chaos
by Brandon Rochat, Cybereason regional sales director for Africa
The task of managing and interpreting vast amounts of data is akin to finding a needle...
Stellar Cyber and ESET Expand Strategic Partnership to Deliver AI-driven XDR...
Stellar Cyber and ESET Expand Strategic Partnership to Deliver AI-driven XDR Solutions
SAN JOSE, CA AND BRATISLAVA
– December 18, 2024 – ESET, a global leader...
Why Empowered People Are the Real Cyber Superpower – Not a...
It's time to retire the tired narrative that employees are the “weakest link” in cybersecurity. They're not. They're simply the most frequently targeted. And...
Africa remains phishing prone, but ongoing training slashes risk
Africa remains phishing prone, but ongoing training slashes riskThe report is based on data from over 12.5 million users across 35,681 organisations in 19...
Cybercriminal for hire: The rise of Ransomware-as-a-Service
Cybercriminal for hire: The rise of Ransomware-as-a-ServiceRansomware-as-a-Service is surging worldwide, turning extortion into a commodity
JOHANNESBURG, South Africa, November 16, 2023/ -- Ransomware attacks are...
Are women underrepresented?
Why women are underrepresented
The latest (ISC)² Cybersecurity Workforce Study found that while gender pay gaps are closing, many female cybersecurity professionals still believe they...
8 reasons why your business may get hacked
8 reasons why your business may get hacked
No matter how big or small, any business can be a target for cyber attackers. While some...
AI, syndicates, Nation-states: As technology converges, so too does cybercrime
The globe continues to become more and more connected, and just like legitimate organisations benefit from technological advances, this interconnectedness is allowing criminal and malicious...
Digital disaster readiness: what local governments must prioritise before the next...
Disaster readiness often brings to mind physical emergencies like fires, storms, or floods. However, in the digital world, disasters are silent, invisible, and entirely...

























































