NEC XON, Palo Alto Networks unite to unlock ROI
NEC XON, a newly certified Palo Alto Networks Diamond Partner, has unveiled its platform-led cybersecurity strategy designed to maximise return on security investment (ROI) for enterprise customers across Africa and beyond. “Tool sprawl is one of the biggest drivers...
Check Point delivers brand office firewall
Check Point Software Technologies has announced major advancements to its family of Quantum Force Security Gateways. All Quantum Force Security Gateways for the data center and perimeter are receiving a 15%-25% performance boost in threat prevention throughput –...
SIEM or endpoint security first for small business cyber defence?
The cyber threat landscape is a minefield, and for small businesses with limited resources, deciding where to invest in security can feel overwhelming. By Dillon Gray, chief operating officer at IPT Recent data from the Arctic Wolf 2025 Threat Report highlights the...
The often-overlooked Achilles heel of local cyber defence
Though the world of cybersecurity is perpetually shifting, one truth has remained constant: humans are generally the weakest link in an organisation's defence. Despite this long-standing flag, a significant cybersecurity awareness gap persists in South Africa, writes...
When AI passes a Turing Tests it goes beyond a human problem
In a public online Turing Test, researchers at the University of California San Diego found that the best-performing GPT-4 prompt passed nearly half the time – outperforming older models, but still behind the human baseline of 66%. As AI becomes better at mimicking...
NordVPN launches post-quantum encryption across all its applications
NordVPN has launched post-quantum encryption (PQE) support for all its VPN applications. The first iteration of post-quantum cryptography was implemented on the NordVPN Linux application last year. In 2025, NordVPN also rolled out its PQE feature for Windows, macOS,...
Predict and prepare for future financial crime
What if the next fraudster you face isn’t even a real person? With digital transformation accelerating and cybercriminals growing more sophisticated, the face of financial crime is evolving, writes By Amritha Reddy, senior director of fraud solutions at TransUnion...
Quantum computing and cybersecurity: A ticking clock or distant threat?
The imminent impact of quantum computing will be explored at the 20th annual ITWeb Security Summit in Johannesburg and Cape Town. Qubits, entanglement, superposition… Understanding the principles and possible impact of quantum computing can be overwhelming even for...
North African communications still highly targeted by DDoS sttacks
The ICT sector in the countries of North Africa is well developed, with Morocco leading the continent in Internet usage at 92,2%, followed by Libya at 88,5% and Tunisia at 84,9%. It should come as no surprise then that the region’s ICT sector also recorded significant...
Honeypots a strategic layer in cyber defence
J2 Software has introduced 'Honeypot as a Service', a plug-and-play solution designed to deceive attackers, gather critical threat intelligence, and ultimately strengthen an organisation’s cyber resilience. This new approach is particularly crucial as cyberattacks...
As Africa banks the unbanked, skills gap invites threats
As African banks continue to bring financial services to millions of the unbanked, an escalating crisis is building: a severe shortage of cybersecurity skills. By Doros Hadjizenonos, regional director at Fortinet South Africa Cyberattacks now rank among the leading...
Tech won’t save your business from cyberthreats
Artificial intelligence (AI) is reshaping the landscape of information security, presenting both unprecedented opportunities and significant new threats. By Ryan Boyes, governance, risk and compliance officer at Galix While AI-driven solutions can enhance threat...