<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

GenAI-driven cyberattacks force a shift to predictive security

The rise of generative artificial intelligence (GenAI)-driven attacks and the growing complexity of interconnected supply chains has placed South African organisations at risk. As cyberfraud becomes commoditised, with bad actors now able to carry out...

The hard truth about endpoint security: Attackers are already ahead

Is endpoint security keeping pace with how attackers actually operate today? Barely and only if you are proactive. By Roy Alves, sales director of J2 Software Today’s attackers are not the amateurs of the past. They are stealthy, adaptive and exploiting the very...

Your cybersecurity strategy is probably wrong – and how to fix it

Recently, I asked a room full of business leaders who among them would rate their cybersecurity posture as "excellent”. Only one hand went up. When I dropped the ranking to "good," just a few more hands were tentatively raised. By Kudakwashe Charandura, head of...

How to delete your digital footprint from the Internet

Users’ digital footprints have been building up for years. Social media accounts, old comments, carelessly posted photos, message boards, and old marketplace listings — everything that each individual user has ever shared online remains there, potentially causing...
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>