<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

How to outsmart zero-day threats in a hyperconnected world

Cyber threats are evolving faster than ever. Among them, zero-day exploits stand out as one of the most unpredictable and damaging. By Avinash Gupta, head of Centre of Excellence at In2IT Technologies These attacks strike before a fix exists, leaving organisations...

Check Point adds AI Cloud Protect powered by Nvidia BlueField

Check Point Software Technologies is working with Nvidia to deliver an integrated security solution built for AI factories. AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference...

What the history of cyber threats can teach us about AI attacks

The greatest threat in cybersecurity right now isn’t the artificial intelligence of the future; it’s the human oversight of the past. For all the sophistication of modern attacks, the most devastating breaches are often echoes of old mistakes written in new code. By...

How SA businesses can safeguard themselves from cybersecurity breaches

Cybercriminal activity in South Africa surged by 14% between July 2024 and July 2025, according to Check Point Research’s Global Threat Intelligence Report. This rising threat affects businesses of all sizes, with recent cyberattacks on state-owned airline South...

When cyber laws backfire …

Regulation was designed to protect customers, curb risk, and hold businesses accountable. But today, it’s often doing the opposite - creating impossible trade-offs, punishing transparency, and turning defenders into accidental offenders. By John Mc Loughlin, CEO of ...

read more

CIMA launches 2025 Cybersecurity Tool 

The Chartered Institute of Management Accountants (CIMA) has launched the latest version of its CGMA Cybersecurity Tool, designed to help finance professionals tackle the growing threat of cyberattacks through robust risk management, response, and remediation...

read more
When likes become a liability …

When likes become a liability …

The use of social media at work – especially on devices connected to internal networks – is putting South African businesses at risk of data breaches and cyberattacks. With no specific laws governing social media use in the workplace, many businesses operate without...

read more

Five ways to outsmart cybercriminals

It often starts with something small: a WhatsApp from a number you don’t recognise, an email that looks like it’s from your bank, or a limited-time offer that seems too good to ignore. Within minutes, a single click or slip of the tongue can cost you thousands....

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>