<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

How SaaS supply chains became cybersecurity’s new weak link

Software-as-a-Service (SaaS) is no longer an IT choice; it’s the operating system of business itself. By Avinash Gupta, head of centre of excellence at In2IT Technologies From Salesforce to Workday, Microsoft 365 to Slack, the SaaS layer now underpins collaboration,...

How to spot and avoid cyber scams during the 2026 Winter Competitions

The 2026 Winter Olympic Games are in full swing, captivating sports fans worldwide. However, the Games also serve as an opportunity for scammers to strike with different kinds of cyber fraud. Kaspersky has identified some of the key scams targeting fans right now –...

AI in cybersecurity: battleground or breakthrough?

The rise of artificial intelligence (AI) has transformed industries from healthcare to finance, but one area where its influence is both promising and perilous is cybersecurity. By Avinash Gupta, head of Centre of Excellence at In2IT Technologies On one hand, AI...

Cyber resilience moves from IT issue to board risk

Cybersecurity has shifted decisively from an IT concern to a core business risk, and South African organisations are feeling this change acutely. By Boland Lithebe, security lead for Accenture, South Africa The World Economic Forum’s Global Cybersecurity Outlook 2026...

WannaCrypt update from Kaspersky Lab

On Friday 12 May 2017, organisations across the world were hit by a massive ransomware attack, named WannaCry, which exploited a (now patched) Microsoft Windows vulnerability revealed in the Shadowbrokers dump on March 14. Kaspersky Lab researchers have continued to...

read more

HID improves fingerprint accuracy

HID Global has enhanced its compact, cost-effective Lumidigm M-Series fingerprint solutions. Bringing the ease-of-use and reliability of multispectral imaging technology into challenging yet cost-sensitive applications such as time and attendance, physical access...

read more

Android permission security flaw spotted

Check Point researchers have spotted a flaw in one of Android’s security mechanisms. Based on Google’s policy which grants extensive permissions to apps installed directly from Google Play, this flaw exposes Android users to several types of attacks, including...

read more

CA payment security reduces online fraud loss

CA Technologies has launched its CA Risk Analytics Network, a card-issuer network that stops card-not-present fraud instantly for network members. Using realtime behaviour analytics, machine learning and global transaction data it can reduce online fraud losses by an...

read more

Securing the software-defined data centre

The term “digital transformation” is on every CIO’s lips today, and a large part of this transformation, is the move to a software-defined data centre (SDDC).  “The SDDC is the IT infrastructure of tomorrow,” says Lutz Blaeser, MD of Intact Software Distribution. “For...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>