<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

The future of PC security is multi-layered and managed

Twenty years ago, enterprise security was straightforward in that enterprise devices never left the premises. By Werner Joubert, commercial SYS business director (South Africa & SADC) at ASUS Perimeter security proved sufficient as business networks were...

Secure multicloud environments enable compliance, resilience and competitiveness

In multicloud environments, security should be about preserving an organisation’s ability to operate and innovate, writes Allan Juma, lead cybersecurity engineer at ESET. South Africa had just emerged from a fairly well-received budget, positive signs from ratings...

Cisco reimagines security for the agentic workforce

Cisco has announced significant security innovations designed for the agentic AI ecosystem, where software no longer just answers questions - it acts. At RSA Conference 2026, Cisco introduced solutions to address AI security issues and remove a top barrier to agent...

The cracks in the password wall

For years, passwords stood as the first - and often only - line of defence between users and cybercriminals. Yet as attacks became more sophisticated, this once-reliable shield turned into a vulnerability, writes Kumar Vaibhav, lead senior solution architect:...

RSA Via solution gains momentum

RSA, the Security Division of EMC, says that its RSA Via portfolio of identity products, and specifically RSA Via Access, is gaining momentum in the marketplace. What's more: customers, partners, technology integrators and analysts are loudly voicing their support....

read more

Gartner positions Sophos as a leader

Gartner has once again named Sophos as a Leader in its 2016 Magic Quadrant report for Endpoint Protection Platforms (EPP), a position Sophos has held since 2007. In the report, Gartner identifies four primary stages in the security lifecycle: setting policy,...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>