<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

The invisible workforce: why household apps have their own digital IDs

Most people understand what it means to protect a human identity because the dangers of someone impersonating you online or stealing and cloning your card are immediately obvious. By Richard Ford, Group chief technology officer of Integrity360 Today, organisations...

Check Point to integrate AI Defense Plane with Google Cloud

Check Point Software Technologies will serve as a launch partner with Google Cloud to integrate Check Point's AI Defense Plane with Google Cloud's Gemini Enterprise Agent Platform. The integration combines centralised agent control with contextual intelligence and...

Man in the middle – the silent threat hiding in encrypted traffic

For most South Africans, the padlock in a browser bar feels like a seal of trust. It’s a comforting sign that says, “Your connection is secure”. But in the digital age, that confidence can be dangerously misplaced, writes Saurabh Prasad, senior solution architect at...

Rising to the era of AI-powered cyber defenve

The world of cybersecurity has fundamentally changed writes Anthony Grieco, senior vice-president and chief security & trust Officer at Cisco. Today, I’m proud to share that Cisco is joining the world’s most critical cyber defenders to...

Planning for tomorrow’s cyberattacks

As organisations think through their cybersecurity strategy for the coming year the challenge they face is how to plan for success, writes Peter Bauer, CEO and co-founder of Mimecast. This past year we’ve seen how cybercriminals continue to become more sophisticated...

read more

Kaspersky runs Tresorit holiday special

Given the cybercrime realities that mobile and Internet users are faced with, it has now become essential for consumers to pay attention to the protection of their mobile devices. However, with the added focus being placed in the cloud, where many consumers use it to...

read more

Shamoon rebooted?

It seems that the Shamoom cyber-attacks have returned, according to this blog post co-written by Raj Samani, chief technology officer: EMEA at Intel Security, and Christiaan Beek. We have recently received notifications and samples from impacted organisations in the...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>