<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

AI in cybersecurity: battleground or breakthrough?

The rise of artificial intelligence (AI) has transformed industries from healthcare to finance, but one area where its influence is both promising and perilous is cybersecurity. By Avinash Gupta, head of Centre of Excellence at In2IT Technologies On one hand, AI...

Cyber resilience moves from IT issue to board risk

Cybersecurity has shifted decisively from an IT concern to a core business risk, and South African organisations are feeling this change acutely. By Boland Lithebe, security lead for Accenture, South Africa The World Economic Forum’s Global Cybersecurity Outlook 2026...

In cybersecurity, the when is just now

Cyber-risk in South Africa is not an if anymore, it’s when the attackers get in and how equipped the company is to deal with it, writes Mohammed Pochee, product manager: security at Vox. A company can very easily find itself offline for more than a week. Attackers can...

Facebook cloning turns your profile into a weapon

Facebook cloning scams are continuing to rise, turning ordinary profiles and family photos into tools for fraud and social engineering, writes Richard Frost, head of technology solutions and consulting at Armata Cyber Security. Have you ever wondered what criminals...

Demystifying cloud cybersecurity

With the rise of edge data centres and an increase in cloud-based computing, companies are facing new challenges in end-to-end cybersecurity. To ensure proper protection, data centre teams must now assess both internal processes and strategies used by cloud suppliers....

read more

Eset is Canalys cybersecurity champion

Eset has achieved Champion status globally for the first time in Canalys Cybersecurity Leadership Matrix 2019. Canalys is a leading global technology market analyst firm with a channel focus; it strives to guide clients on the future of the technology industry and to...

read more

Building a zero trust environment

People are the new perimeter and identity is at the very core of maintaining a secure, trusted environment. New technologies and trends, including the mobile workforce, BYOD, IoT, digital transformation, and the consumerisation of IT, are shifting identity and access...

read more

Unseen cloud threats exposed

Check Point Software Technologies has announced the release of CloudGuard Log.ic, a solution which delivers cloud-native threat protection and security intelligence. Using CloudGuard Log.ic, customers can now see every data flow and audit trail in today’s elastic...

read more

AI in cybersecurity – friend or foe?

It’s no news that advances in AI and machine learning have enormous transformative potential for cybersecurity defences. Simon McCullough, major channel account manager at F5 Networks However, rapid advances in technology also result in big opportunities for hackers...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>