Boardrooms don’t get hacked by accident
Behind almost every major cyber incident is a familiar pattern. There was no formal cybersecurity strategy. There was no clear accountability at executive level.
By Wilfred M Kahlari
May. 21, 2026
How Zim must fight intelligent cybercrime with intelligent defence
In Zimbabwe, this shift is already visible. Deepfake voice cloning is being used to impersonate executives and authorise fraudulent transactions.
By Wilfred M Kahlari
May. 14, 2026
The phone number that can empty your wallet
Data goes silent. But somewhere else, another device may now be receiving the verification codes meant for you. That is when the real damage begins.
By Wilfred M Kahlari
May. 1, 2026
How scammers execute fraudulent transfers from firms to their accounts
The unsuspecting employee processes the transfer, believing it to be a legitimate request; and
By Jacob Mutisi
Feb. 28, 2025
Protect yourself on the cyber space
Cloned websites and apps are fake versions of real platforms, designed to look identical to trusted services like banking, shopping or government portals.
By Jacob Mutisi
Nov. 1, 2024




