<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Creating a culture of cyber awareness across SA requires a mind shift

Let’s be honest, when most people hear “cybersecurity”, their minds jump straight to firewalls, passwords, and maybe a stern compliance checklist. By Tshepo Mokoena, chairperson at In2IT Technologies However, cybersecurity is no longer the sole domain of IT...

Cloud security demands a smarter, managed approach

As more businesses move their operations to the cloud, securing these environments has become a strategic imperative. By Ryan Boyes, governance, risk and compliance officer at Galix Fortinet’s 2025 report reveals that 35% of IT security budgets are now dedicated to...

Your old hardware could be your most expensive cyber threat

Too many organisations treat secure IT disposal as an afterthought. Once a laptop or hard drive is no longer in use, it’s often left to gather dust or sent to recycling without proper data wiping. That’s a major risk. Sensitive information doesn’t disappear when a...

Visibility that drives real resilience

Strong cybersecurity begins with the ability to see everything, writes Roy Alves, sales director of J2. Visibility starts with a real time view of the client’s entire digital estate across endpoints, networks, cloud and hybrid environments. This approach relies on...

Protecting against today’s advanced threats

Although companies are investing millions in cyber security solutions, stories of advanced cyber-attacks continue to flood the headlines on a daily basis. The attackers are succeeding, and are wreaking significant financial, operational and reputational damage to...

read more

New firewalls from Fortinet

Fortinet has launched its new FortiWeb 4000E and 3000E Web Application Firewalls (WAFs), designed to help customers prevent identity theft, financial fraud and denial of service through specialised, layered application threat protection. ortiWeb appliances now offer...

read more

Reducing the cyber-attack surface

Most breaches and attacks do not happen quickly and violently. They happen stealthily over time, with threat actors lurking inside your network for months at a time, performing reconnaissance and looking for your most valuable and sensitive information. “In fact, the...

read more

Why standard data centre designs don’t work

Fast deployment time compared to traditional brick and mortar facilities is one of the biggest advantages of prefabricated data centres. Time can be saved in many areas of a project. However, when it comes to the actual initial design phase of a data centre, it simply...

read more

Xerox combats counterfeiting with printed memory

To help businesses and government better secure products as they are distributed, Xerox has introduced two printed electronic labels (also known as “printed memory”) that can collect and store information about the authenticity and condition of products. Xerox Printed...

read more

CA leads in API management, says KuppingerCole

CA Technologies  has been named the “overall leader” in API management in the recent Leadership Compass report issued by KuppingerCole, an analyst firm for identity-focused information security. CA’s API Management solutions were evaluated for the report, which...

read more

Changing the security culture

Ask any technical department what their major challenges are concerning cyber security, and it is almost guaranteed that many of them say their number one bugbear is changing the security culture of their organisation. Too often, says Jayson O’Reilly, director of...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>