Boardrooms don’t get hacked by accident

Behind almost every major cyber incident is a familiar pattern. There was no formal cybersecurity strategy. There was no clear accountability at executive level.
By Wilfred M Kahlari May. 21, 2026

How Zim must fight intelligent cybercrime with intelligent defence

In Zimbabwe, this shift is already visible. Deepfake voice cloning is being used to impersonate executives and authorise fraudulent transactions.
By Wilfred M Kahlari May. 14, 2026

The phone number that can empty your wallet

Data goes silent. But somewhere else, another device may now be receiving the verification codes meant for you. That is when the real damage begins.
By Wilfred M Kahlari May. 1, 2026

How scammers execute fraudulent transfers from firms to their accounts

The unsuspecting employee processes the transfer, believing it to be a legitimate request; and
By Jacob Mutisi Feb. 28, 2025

Protect yourself on the cyber space

Cloned websites and apps are fake versions of real platforms, designed to look identical to trusted services like banking, shopping or government portals.
By Jacob Mutisi Nov. 1, 2024