<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Creating a culture of cyber awareness across SA requires a mind shift

Let’s be honest, when most people hear “cybersecurity”, their minds jump straight to firewalls, passwords, and maybe a stern compliance checklist. By Tshepo Mokoena, chairperson at In2IT Technologies However, cybersecurity is no longer the sole domain of IT...

Cloud security demands a smarter, managed approach

As more businesses move their operations to the cloud, securing these environments has become a strategic imperative. By Ryan Boyes, governance, risk and compliance officer at Galix Fortinet’s 2025 report reveals that 35% of IT security budgets are now dedicated to...

Your old hardware could be your most expensive cyber threat

Too many organisations treat secure IT disposal as an afterthought. Once a laptop or hard drive is no longer in use, it’s often left to gather dust or sent to recycling without proper data wiping. That’s a major risk. Sensitive information doesn’t disappear when a...

Visibility that drives real resilience

Strong cybersecurity begins with the ability to see everything, writes Roy Alves, sales director of J2. Visibility starts with a real time view of the client’s entire digital estate across endpoints, networks, cloud and hybrid environments. This approach relies on...

BDO cyber lab to combat crime

As of June 2015, South Africa was one of only 28 countries in the world with a cybersecurity policy in place. Although a heavily criticised policy, it shows that government recognises the dangers of cybercrime. “We are living in an age where information travels...

read more

Samsung, Citrix extend tech partnership

Samsung in collaboration with Citrix XenMobile is to provide the highest level of application and data security for Android environments available on the market today. Citrix XenMobile is an Enterprise Mobility Management (EMM) suite that provides total mobile freedom...

read more

Are contactless cards cloneable?

The security community has been demonstrating successful cloning of contactless transactions since at least 2012. Full cloning of cards is not possible, and current cloning methods can only rely on copying an out-of-date implementation of the contactless standard to...

read more

Security is about planning for failure

As the world continues to become increasingly connected, organisations are faced with large quantities of data they need to protect and make sense of. International Data Corporation (IDC) predicts that 66% of CEOs will have digital transformation at the centre of...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>