<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

The invisible workforce: why household apps have their own digital IDs

Most people understand what it means to protect a human identity because the dangers of someone impersonating you online or stealing and cloning your card are immediately obvious. By Richard Ford, Group chief technology officer of Integrity360 Today, organisations...

Check Point to integrate AI Defense Plane with Google Cloud

Check Point Software Technologies will serve as a launch partner with Google Cloud to integrate Check Point's AI Defense Plane with Google Cloud's Gemini Enterprise Agent Platform. The integration combines centralised agent control with contextual intelligence and...

Man in the middle – the silent threat hiding in encrypted traffic

For most South Africans, the padlock in a browser bar feels like a seal of trust. It’s a comforting sign that says, “Your connection is secure”. But in the digital age, that confidence can be dangerously misplaced, writes Saurabh Prasad, senior solution architect at...

Rising to the era of AI-powered cyber defenve

The world of cybersecurity has fundamentally changed writes Anthony Grieco, senior vice-president and chief security & trust Officer at Cisco. Today, I’m proud to share that Cisco is joining the world’s most critical cyber defenders to...

The new cyber-norm

Today is D-Day for banks and the City of Johannesburg to pay ransom demands sent through by hackers last week. Bryan Hamman, Regional Director at NETSCOUT, which offers NETSCOUT Arbor, specialising in advanced DDos protection solutions, offers this explanation of DDoS...

read more

Security spend on the rise

The global cybersecurity market is booming, the demand for cybersecurity solutions is huge and security spend has already started outpacing IT spend. Adoption in South Africa is not yet growing at the same rate, but there is a strong growth in interest and...

read more

Watch your perimeter

Imagine being able to detect if an intruder is attempting to breach the perimeter of a property in a remote location? Imagine knowing that your fence can detect the intrusion, notifying the authorities and preventing the intruders from getting any closer to their end...

read more

Securing abandoned mines

In mineral-rich South Africa, mining is an important part of the GDP employing nearly half a million people. Vanessa Tyne, senior KAM and team lead at Axis Considering that the sector consists of diamonds, gold, platinum, and coal, it is easy to understand why local...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>