South Africa is ranked globally as the most vulnerable to fraudulent and high-risk financial advertisements on social media platforms.
Over 80% of phishing e-mails analysed were enhanced using AI – making them far more convincing than ever before, according to KnowBe4 research.
Choosing the right firewall solution depends on your company’s architecture, security requirements and team expertise, says BBD Cloud Solutions.
The critical differentiator isn’t whether you’re attacked – it’s how quickly and effectively you respond, says Ryno Le Roux, cyber operations manager at NEC XON.
Supply chain vulnerabilities mean attackers may go after smaller businesses to gain access to larger partners or clients, says Ross Anderson, Sophos BU executive at Duxbury Networking.
From shadow AI to under-secured models, artificial intelligence practices can undermine cyber security.
SA's channel must evolve into a trusted security advisor role, says Aveshan Aiyer, channel manager for Check Point at Westcon-Comstor.
Hackers are continuously searching the perimeter for exploitable vulnerabilities.
Application programming interfaces are 'the front door to data', according to experts at the recent ITWeb Security Summit 2025.
After two years of rising, fraud seems to be flattening. But are AI-powered fraudsters merely retooling for the next phase?
Lucky Majangandile Erasmus was sentenced by the Specialised Commercial Crimes Court for cyber fraud, theft of data and attempted cyber extortion.