<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Excuse me while I slip on past your security

Attackers are bypassing the very tools designed to prevent them from gaining access to the business, writes Richard Frost, head of technology solutions and consulting at Armata Cyber Security. AI-powered phishing has become the most virulent security threat to the...

Beyond the gate: access control works with physical barriers

In an age of smart homes, mobile alerts and cloud-connected cameras, it is tempting to believe that security has become purely digital. Yet, when it comes to protecting South African homes, estates and small businesses, true security still begins and ends with...

Hexnode expands into Africa

Hexnode, the enterprise software division of Mitsogo, has released Hexnode XDR, its extended detection and response platform that underpins its effort to strengthen cyber resilience across African organisations. Across Africa, cyber threats continue to escalate in...

New training scenarios from Kaspersky

Kaspersky has expanded its flagship awareness platform, Kaspersky Interactive Protection Simulation (KIPS), introducing new and updated scenarios that reflect the evolving cyberthreat landscape. The release aims to help corporations, banks and IT companies enhance...

Check Point secures AI factories with Nvidia

Check Point Software Technologies’ AI Cloud Protect is now part of Nvidia Enterprise AI Factory validated design for AI runtime cyber security, enhanced protection, and robust infrastructure acceleration capabilities. “The integration of Check Point AI Cloud...

read more

Navigating cybersecurity in 2026

For years, the cybersecurity industry has warned that threats are becoming ‘more sophisticated’. By Beth Miller, field CISO at Mimecast In reality, attackers aren’t getting smarter, they’re simply leveraging new tech to exploit the same long-standing vulnerabilities...

read more

Visibility that drives real resilience

Strong cybersecurity begins with the ability to see everything, writes Roy Alves, sales director of J2. Visibility starts with a real time view of the client’s entire digital estate across endpoints, networks, cloud and hybrid environments. This approach relies on...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>