The state-owned bank strengthens security controls after a January ransomware attack compromised internal records.
South African organisations are operating in an increasingly complex technology landscape.
Shadow AI can quietly undermine an organisation’s security, compliance and governance posture.
The solutions are data security posture management; directory management; identity management; identity threat detection and response; privileged access management; and endpoint management.
Cyber security teams are drowning in tools, and that complexity is contributing to breaches, says Thiery Karsenti of Palo Alto Networks.
Relying on a single security provider for your data centre link, regardless of speed, creates vulnerability, says Bitrate's Jeroen Dubbelman.
Identity fraud is no longer a marginal cyber risk in South Africa; it is a full-scale crisis, says Akhona Nkalitshane, business development manager at Altron Arrow.
Attacks now bypass traditional controls entirely, exploiting legitimate tools, cloud services and human behaviour, says Ivaan Captieux, security consultant at Galix.
Most companies have no clear picture of how many identities exist within their environment, what access they have or whether that access is still appropriate, says Reghardt Van Der Rijst, practice lead: identity at Altron Security.
The Anthropic AI coding tool flaw exposes the security risks of building websites with artificial intelligence.
Palo Alto Networks warns that African organisations are facing AI-accelerated cyber threats as attacks speed up from days to minutes.
Why South African organisations must stop treating cyber risk as a technical inconvenience.