<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Why you must train your AI agents just as hard as your employees

As Data Privacy Day approaches (28 January 2026), the conversation around protecting information has shifted yet again. For years, the mantra was simple: train your people. But in 2026, the workforce has expanded. We have arrived at a point where we are managing the...

Annual job hopping makes for a grim cybersecurity season

Many South Africans will be switching jobs come January and February after year-end bonuses and some post-holiday reflection. By Heino Gevers, senior director of technical support at Mimecast SA And, while HR departments are geared up to contend with the expected...

In fraud, we need to accept that seeing is no longer believing 

By Richard Ford, group chief technology officer of Integrity360, outlines this scenario: You answer the phone. It is your daughter. You know it is her because you recognise the panic in her voice. She has run out of petrol in an area she doesn’t know; her phone is on...

Using AI to protect data is crucial

The cybersecurity landscape is rapidly changing, with hackers increasingly utilising artificial intelligence (AI) to carry out sophisticated attacks on their targets, writes Hemant Harie, group chief technology officer at Data Management Professionals South Africa. To...

HID improves fingerprint accuracy

HID Global has enhanced its compact, cost-effective Lumidigm M-Series fingerprint solutions. Bringing the ease-of-use and reliability of multispectral imaging technology into challenging yet cost-sensitive applications such as time and attendance, physical access...

read more

Android permission security flaw spotted

Check Point researchers have spotted a flaw in one of Android’s security mechanisms. Based on Google’s policy which grants extensive permissions to apps installed directly from Google Play, this flaw exposes Android users to several types of attacks, including...

read more

CA payment security reduces online fraud loss

CA Technologies has launched its CA Risk Analytics Network, a card-issuer network that stops card-not-present fraud instantly for network members. Using realtime behaviour analytics, machine learning and global transaction data it can reduce online fraud losses by an...

read more

Securing the software-defined data centre

The term “digital transformation” is on every CIO’s lips today, and a large part of this transformation, is the move to a software-defined data centre (SDDC).  “The SDDC is the IT infrastructure of tomorrow,” says Lutz Blaeser, MD of Intact Software Distribution. “For...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>