<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

The cracks in the password wall

For years, passwords stood as the first - and often only - line of defence between users and cybercriminals. Yet as attacks became more sophisticated, this once-reliable shield turned into a vulnerability, writes Kumar Vaibhav, lead senior solution architect:...

Continuous threat exposure management the new cybersecurity imperative

The old playbook of periodic vulnerability scans and annual security audits no longer suffices when attackers operate in real time, using automation and artificial intelligence (AI) to exploit the tiniest cracks in digital defences. By Saurabh Prasad, senior solution...

Top 10 cybersecurity trends and terrors of 2026

There is one word that describes cybersecurity right now, writes Jeanette Simpson, head of product management at Armata Cyber Security, and that’s ‘acceleration’. Attacks are scaling faster. Ransomware activity has increased 25% year-on-year and the number of...

Deepfake fraud escalates as detection technology enters SA

Certified AI Access, a South African AI trust and risk infrastructure company, and Reality Defender, a deepfake detection platform, today announced a partnership to deploy enterprise-grade deepfake detection technology across South Africa’s financial sector. The...

The new cyber-norm

Today is D-Day for banks and the City of Johannesburg to pay ransom demands sent through by hackers last week. Bryan Hamman, Regional Director at NETSCOUT, which offers NETSCOUT Arbor, specialising in advanced DDos protection solutions, offers this explanation of DDoS...

read more

Security spend on the rise

The global cybersecurity market is booming, the demand for cybersecurity solutions is huge and security spend has already started outpacing IT spend. Adoption in South Africa is not yet growing at the same rate, but there is a strong growth in interest and...

read more

Watch your perimeter

Imagine being able to detect if an intruder is attempting to breach the perimeter of a property in a remote location? Imagine knowing that your fence can detect the intrusion, notifying the authorities and preventing the intruders from getting any closer to their end...

read more

Securing abandoned mines

In mineral-rich South Africa, mining is an important part of the GDP employing nearly half a million people. Vanessa Tyne, senior KAM and team lead at Axis Considering that the sector consists of diamonds, gold, platinum, and coal, it is easy to understand why local...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>