<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Architecting security in fintech: It’s in the whiteboard details

African organisations face an average of 3 153 cyberattacks a week, which is around 60% higher than the global average. The continent is sitting right in the proverbial thick of the threats, with fraud and attacks costing companies thousands. The African financial...

The future of PC security is multi-layered and managed

Twenty years ago, enterprise security was straightforward in that enterprise devices never left the premises. By Werner Joubert, commercial SYS business director (South Africa & SADC) at ASUS Perimeter security proved sufficient as business networks were...

Secure multicloud environments enable compliance, resilience and competitiveness

In multicloud environments, security should be about preserving an organisation’s ability to operate and innovate, writes Allan Juma, lead cybersecurity engineer at ESET. South Africa had just emerged from a fairly well-received budget, positive signs from ratings...

Cisco reimagines security for the agentic workforce

Cisco has announced significant security innovations designed for the agentic AI ecosystem, where software no longer just answers questions - it acts. At RSA Conference 2026, Cisco introduced solutions to address AI security issues and remove a top barrier to agent...

Why standard data centre designs don’t work

Fast deployment time compared to traditional brick and mortar facilities is one of the biggest advantages of prefabricated data centres. Time can be saved in many areas of a project. However, when it comes to the actual initial design phase of a data centre, it simply...

read more

Xerox combats counterfeiting with printed memory

To help businesses and government better secure products as they are distributed, Xerox has introduced two printed electronic labels (also known as “printed memory”) that can collect and store information about the authenticity and condition of products. Xerox Printed...

read more

CA leads in API management, says KuppingerCole

CA Technologies  has been named the “overall leader” in API management in the recent Leadership Compass report issued by KuppingerCole, an analyst firm for identity-focused information security. CA’s API Management solutions were evaluated for the report, which...

read more

Changing the security culture

Ask any technical department what their major challenges are concerning cyber security, and it is almost guaranteed that many of them say their number one bugbear is changing the security culture of their organisation. Too often, says Jayson O’Reilly, director of...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>