<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

AI is silently turning into your organisation’s biggest cyber threat

AI didn’t storm in with board approval or a security checklist, writes By John Mc Loughlin, CEO of J2. It crept in unnoticed, drafting emails faster than you can read them, generating code on the fly, automating workflows behind the scenes, and empowering support...

AI and cybersecurity: Trust must come before scale

As artificial intelligence continues its rapid move from experimentation into production environments, 2025 marked a turning point for how organisations approach AI adoption – particularly in the context of cybersecurity, governance and enterprise risk. According to...

How SaaS supply chains became cybersecurity’s new weak link

Software-as-a-Service (SaaS) is no longer an IT choice; it’s the operating system of business itself. By Avinash Gupta, head of centre of excellence at In2IT Technologies From Salesforce to Workday, Microsoft 365 to Slack, the SaaS layer now underpins collaboration,...

How to spot and avoid cyber scams during the 2026 Winter Competitions

The 2026 Winter Olympic Games are in full swing, captivating sports fans worldwide. However, the Games also serve as an opportunity for scammers to strike with different kinds of cyber fraud. Kaspersky has identified some of the key scams targeting fans right now –...

Big increase in active malware families

Check Point Software Technologies has published its latest Threat Index for May 2016, revealing that the number of active global malware families increased by 15% in May 2016. The May Threat Index presents a mixed view of Africa, with several countries making quite...

read more

Netxactics now offers Thycotic PAM solutions

Security solution distributor, Netxactics, has announced availability of the Thycotic range of Privileged Account Management (PAM) software solutions. This is the first time the product set is available locally, and offers protection against cyber-attacks that use...

read more

How SMMEs can maximise IT security

As the bulk of the South African economy is made up of SMMEs, it is important that cash-strapped IT managers take steps to ensure that their businesses are protected against malicious attacks. Steve Buck, director of Edgetec, says current market conditions are tough...

read more

BDO cyber lab to combat crime

As of June 2015, South Africa was one of only 28 countries in the world with a cybersecurity policy in place. Although a heavily criticised policy, it shows that government recognises the dangers of cybercrime. “We are living in an age where information travels...

read more

Samsung, Citrix extend tech partnership

Samsung in collaboration with Citrix XenMobile is to provide the highest level of application and data security for Android environments available on the market today. Citrix XenMobile is an Enterprise Mobility Management (EMM) suite that provides total mobile freedom...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>