<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

How SaaS supply chains became cybersecurity’s new weak link

Software-as-a-Service (SaaS) is no longer an IT choice; it’s the operating system of business itself. By Avinash Gupta, head of centre of excellence at In2IT Technologies From Salesforce to Workday, Microsoft 365 to Slack, the SaaS layer now underpins collaboration,...

How to spot and avoid cyber scams during the 2026 Winter Competitions

The 2026 Winter Olympic Games are in full swing, captivating sports fans worldwide. However, the Games also serve as an opportunity for scammers to strike with different kinds of cyber fraud. Kaspersky has identified some of the key scams targeting fans right now –...

AI in cybersecurity: battleground or breakthrough?

The rise of artificial intelligence (AI) has transformed industries from healthcare to finance, but one area where its influence is both promising and perilous is cybersecurity. By Avinash Gupta, head of Centre of Excellence at In2IT Technologies On one hand, AI...

Cyber resilience moves from IT issue to board risk

Cybersecurity has shifted decisively from an IT concern to a core business risk, and South African organisations are feeling this change acutely. By Boland Lithebe, security lead for Accenture, South Africa The World Economic Forum’s Global Cybersecurity Outlook 2026...

Bytes launches home-grown biometric service

Bytes Systems Integration has launched BioVault, an innovative cloud-based biometric solution. Nick Perkins, divisional director: identity management at Bytes, says the new service has been developed and hosted by Bytes to enable a broad range of financial services...

read more

Check Point unveils WannaCry infection map

Check Point Software Technologies shows the extent of the wide spread outbreak of international ransomware WannaCry with a new Check Point WannaCry Ransomware Infection Map. Check Point researchers have been investigating the ransomware campaign in detail since it was...

read more

40% off cross-grade B2B promotion from Intact

When it comes to security, it can be hard to sift through the plethora of solutions available to find the one that will benefit your business the most. What today’s businesses need, is a solution that is truly comprehensive and customisable. “This is where Bitdefender...

read more

WannaCryptor: key questions answered

WannaCryptor, aka WannaCry, is one of the biggest cybersecurity stories of 2017. In fact, you could go as far as to suggest one of the biggest in years. Since news first broke on Friday, broadcasters, journalists, bloggers, commentators, experts and security vendors,...

read more

Bitdefender blocks WannaCry ransomware attack

Bitdefender claims that it has blocked WannaCry from the beginning. Unlike other ransomware families, the WannaCry strain does not spread via infected e-mails or infected links. Instead, it takes advantage of a security hole in most Windows versions to automatically...

read more

BT Security and the WannaCry attack

Mark Hughes, CEO of BT Security, tenders this statement: WannaCry brought to the front many of the issues we, security professionals have been highlighting for considerable time. It is not the first global attack, but it is unique in its scope and the way it spread....

read more

How to defend against WannaCry

An unprecedented wave of ransomware infections is hitting organizations in all industries around the world. The culprit: the WannaCry/WCry ransomware (detected by Trend Micro as RANSOM_WANA.A and RANSOM_WCRY.I). Trend Micro has been tracking WannaCry since its...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>