<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

The cracks in the password wall

For years, passwords stood as the first - and often only - line of defence between users and cybercriminals. Yet as attacks became more sophisticated, this once-reliable shield turned into a vulnerability, writes Kumar Vaibhav, lead senior solution architect:...

Continuous threat exposure management the new cybersecurity imperative

The old playbook of periodic vulnerability scans and annual security audits no longer suffices when attackers operate in real time, using automation and artificial intelligence (AI) to exploit the tiniest cracks in digital defences. By Saurabh Prasad, senior solution...

Top 10 cybersecurity trends and terrors of 2026

There is one word that describes cybersecurity right now, writes Jeanette Simpson, head of product management at Armata Cyber Security, and that’s ‘acceleration’. Attacks are scaling faster. Ransomware activity has increased 25% year-on-year and the number of...

Deepfake fraud escalates as detection technology enters SA

Certified AI Access, a South African AI trust and risk infrastructure company, and Reality Defender, a deepfake detection platform, today announced a partnership to deploy enterprise-grade deepfake detection technology across South Africa’s financial sector. The...

Building a zero trust environment

People are the new perimeter and identity is at the very core of maintaining a secure, trusted environment. New technologies and trends, including the mobile workforce, BYOD, IoT, digital transformation, and the consumerisation of IT, are shifting identity and access...

read more

Unseen cloud threats exposed

Check Point Software Technologies has announced the release of CloudGuard Log.ic, a solution which delivers cloud-native threat protection and security intelligence. Using CloudGuard Log.ic, customers can now see every data flow and audit trail in today’s elastic...

read more

AI in cybersecurity – friend or foe?

It’s no news that advances in AI and machine learning have enormous transformative potential for cybersecurity defences. Simon McCullough, major channel account manager at F5 Networks However, rapid advances in technology also result in big opportunities for hackers...

read more

Sophos acquires Rook Security

Sophos has acquired Rook Security, a pioneer and leader in managed detection and response (MDR) services. Rook Security provides a 24/7 team of cyberthreat hunters and incident response experts who monitor, hunt for, analyze and respond to security incidents for...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>