Latest Blog Posts
Quantum Computing and its Impact On Cybersecurity: What You Need to Know
By understanding the basics of quantum computing and how it relates to the future of cybersecurity, you can understand the potential risks, take preventative steps for information security, and see…
From Smartphones to Smart Homes: Extending Mobile Security to IoT Devices
The ever expanding Internet of Things (IoT) ecosystem is changing how we interact with technology in our daily lives. From smart security systems and televisions to intelligent refrigerators and…
Strengthening Cybersecurity with Continuous Threat Exposure Management
Organisations are proactively combating the rise of increasingly sophisticated and ever-evolving cyber risks by taking advantage of Continuous Threat Exposure Management (CTEM) programs to ensure the…
Understanding Mobile Security: The Basics of Biometric Authentication
Biometric authentication is a powerful tool in mobile security. It has revolutionised the way we protect our devices and sensitive information and made it easier and more convenient to use our phones…
Latest Press Releases
From Garage to Cybersecurity Titan: ESET Southern Africa Celebrates its 20-Year Journey in Shaping the Digital Landscape
This year, ESET Southern Africa celebrates 20 years of leading the cybersecurity industry in South Africa, offering product solutions to businesses of all sizes, whether consumer or enterprise. Since…
Beware of Tax Season Scammers
At their core, tax scams, and indeed many online scams, rely on some form of social engineering. “Scammers contact you via email or SMS and are quite deliberate in creating a sense of urgency to…
Data Breaches and Their Fallout For South African Enterprises and Consumers
Data breaches are a chronic and growing menace for South African enterprises and consumers. Interconnected systems mean data breaches have become widespread threats, affecting millions. As businesses…
AI's Double-Edged Sword Requires a Human Security Approach
The double-edged generative AI (gen AI) sword can be used by malicious actors to craft sophisticated phishing emails, spam, and disinformation campaigns, amplifying the scale and effectiveness of…