<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

The real ROI of security: Moving beyond cost to performance

In South Africa, security is still widely viewed as a grudge purchase, a necessary expense rather than a strategic investment. Too often, buying decisions focus on upfront price, with the assumption that most security products offer similar protection. But the reality...

Ransomware is shifting targets – and many organisations are not prepared

Ransomware attacks are evolving rapidly, moving beyond the simple encryption of files to target the systems organisations rely on to recover from an attack. According to Phila May, executive GTM at inq. Digital, this shift is forcing technology leaders to rethink how...

MDR helps SA businesses stay ahead of attackers

At the start of 2024, a Hong Kong finance worker at a multinational firm joined what appeared to be a routine video call with senior leadership. The call included people who looked and sounded like the company's UK-based CFO and other executives, but they were...

Why digital trust matters for African SMEs

For years, security for SMEs across sub-Saharan Africa meant metal grilles and alarm systems. Today, the most significant risks are invisible and growing faster than most businesses realise, writes Andrew Bourne, regional head of Zoho South Africa. Artificial...

Full-spectrum security in a complex world

Kathy Gibson is at Gartner Symposium in Cape Town – Digital and workforce transformation are underpinned by IT and security transformation. Many of the trends we are seeing are driven by a massive increase in data, says Servaas Venter, director: data protection...

read more

Email hackers defeated by AI

Email is a regular method of attack for the cybercriminal because it is the easiest and most successful way to spread high-risk threats. This makes it one of the most popular vectors in a hacker's arsenal. The thing with hacking an email account is that the hacked...

read more

Take a human centric approach to security

Every time the details of a new security breach hits the headlines, something is made clear: Security tools and solutions aren’t working. Yet businesses continue to throw more and more money and technology at the problem. It’s time to look at the human factor, which...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>