FICA in the era of deepfake and AI-driven fraud
AI-powered scams are rapidly reshaping the fraud landscape, exposing new vulnerabilities within financial systems and eroding public trust in digital communication. In recent months,...
Even as quantum threats to cybersecurity loom, going back to basics...
Despite the escalating sophistication of AI-generated threats and the looming specter of quantum computing capable of shattering current encryption, the organisations staying ahead of...
Why Cybersecurity is key to underpinning Africa’s open banking dream
Africa’s financial sector is evolving fast. Open banking – the model where banks share customer data securely with third parties via APIs – is...
Troye introduces Arctic Wolf’s New Aurora Endpoint Platform
Troye, a trusted Arctic Wolf partner, is proud to unveil the powerful Aurora Endpoint suite. This robust platform provides comprehensive protection, detection, and response capabilities...
The SME cybersecurity gap: Why hackers are targeting the underdogs
A series of recent cyberattacks has shaken South Africa's retail sector, revealing vulnerabilities that many businesses - especially SMEs - can no longer afford...
Is password-based security ending
The password is no longer a fortress in and of itself. In a landscape where attackers effortlessly bypass traditional defences, passwords have become more...
Orange Cyberdefense launches ActiveWatch: Relentless perimeter-testing powered by SensePost skills and...
Orange Cyberdefense, a global leader in cybersecurity services, has launched ActiveWatch, a groundbreaking solution that merges continuous attack surface discovery and penetration testing of...
Why Empowered People Are the Real Cyber Superpower – Not a...
It's time to retire the tired narrative that employees are the “weakest link” in cybersecurity. They're not. They're simply the most frequently targeted. And...
Raising a cyber-smart generation: Practical steps for youths, parents, and employers
South Africa’s youth are fluent in the language of digital, but that fluency can become a dangerous false sense of security. Every day, cybercriminals...
cybersecurity expert and J2 Software CEO John Mc Loughlin
Phishing, vishing, and smishing attacks have increased significantly, leveraging advanced technologies and personalised tactics to deceive individuals and organisations. These threats exploit personal information,...
SensePost debuts SecDevOps: A developer-oriented security training course
Orange Cyberdefence SensePost will be launching a new information security training course aimed at enriching software developers with security thinking. The SecDevOps course has...
SOFTSWISS steps onto the South African tech stage as a sponsor...
Cape Town, South Africa – Global tech company SOFTSWISS is making its first major public debut in South Africa as a proud sponsor of Africa Tech...
Quantum computing and cybersecurity: A ticking clock or distant threat?
The imminent impact of quantum computing will be explored at the 20th annual Security Summit in Johannesburg and Cape Town.
Qubits, entanglement, superposition… Understanding the...
Honeypots become a strategic layer in cyber defence
J2 Software has introduced 'Honeypot as a Service', a plug-and-play solution designed to deceive attackers, gather critical threat intelligence, and ultimately strengthen an organisation's...
SA’s strained, loadshedding-prone grid faces mounting cyber threats – smart meters...
South Africa's energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis: a wave of cyber threats that could turn...


























































