<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Upgrade your PCs to upgrade security

The latest-gen commercial AI PCs are designed to keep you ahead of cyber adversaries, writes Tony Bartlett, director of data centre compute at Dell Technologies South Africa. Did you know that a cyberattack occurs every 39 seconds? It’s no wonder. The payoff for a...

How to fight back when SA becomes a top target for cyber crime

Imagine you waking up to discover that your operations have been frozen, your mailbox is overflowing with ransom demands, and your customer data has been compromised. This is no longer just a hypothetical situation for a growing number of South African companies,...

Why hackers are targeting the underdogs

A series of recent cyberattacks has shaken South Africa's retail sector, revealing vulnerabilities that many businesses - especially SMEs - can no longer afford to ignore. E-commerce retailer OneDayOnly fell victim to a data breach by the hacking group Kill Security...

Troye debuts Arctic Wolf’s Aurora Endpoint platform

Troye has launched the Aurora Endpoint suite, a robust platform providing protection, detection, and response capabilities across every stage of an organisation’s cybersecurity maturity. Helen Kruger, MD of Troye, says with the new Aurora Endpoint platform, clients...

Full-spectrum security in a complex world

Kathy Gibson is at Gartner Symposium in Cape Town – Digital and workforce transformation are underpinned by IT and security transformation. Many of the trends we are seeing are driven by a massive increase in data, says Servaas Venter, director: data protection...

read more

Email hackers defeated by AI

Email is a regular method of attack for the cybercriminal because it is the easiest and most successful way to spread high-risk threats. This makes it one of the most popular vectors in a hacker's arsenal. The thing with hacking an email account is that the hacked...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>