<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Africa could leapfrog legacy cybersecurity models

South African organisations - particularly those responsible for critical infrastructure - need to rethink their reliance on legacy “trusted network” approaches. “It’s a major systemic risk,” says Armand Kruger, head of cybersecurity at NEC XON. However, the fact that...

The case for treating cybersecurity as a corporate sustainability metric

ESG discussions in South African boards generally default to carbon, community impact and governance process. While those remain essential, they don’t tell the full story of organisational sustainability, writes Richard Ford, group chief technology officer of...

AI, global uncertainty to top talks at Southern Africa’s leading cyber security event

Geopolitical uncertainty and AI’s impact on the security landscape are expected to top the agenda when over 1,000 cyber security stakeholders gather for the annual ITWeb Security Summit in Johannesburg next month. The ITWeb Security Summit, renowned as the must-attend...

Your company is already breached, you just don’t know it yet

Attackers are no longer relying on sophisticated exploits to break in. Instead, they are systematically targeting weak credentials, misconfigured systems, and exposed devices, writes J2 Software sales director Roy Alves. In fact, multiple industry reports now show...
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>