<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Navigating cybersecurity in 2026

For years, the cybersecurity industry has warned that threats are becoming ‘more sophisticated’. By Beth Miller, field CISO at Mimecast In reality, attackers aren’t getting smarter, they’re simply leveraging new tech to exploit the same long-standing vulnerabilities...

Creating a culture of cyber awareness across SA requires a mind shift

Let’s be honest, when most people hear “cybersecurity”, their minds jump straight to firewalls, passwords, and maybe a stern compliance checklist. By Tshepo Mokoena, chairperson at In2IT Technologies However, cybersecurity is no longer the sole domain of IT...

Cloud security demands a smarter, managed approach

As more businesses move their operations to the cloud, securing these environments has become a strategic imperative. By Ryan Boyes, governance, risk and compliance officer at Galix Fortinet’s 2025 report reveals that 35% of IT security budgets are now dedicated to...

Your old hardware could be your most expensive cyber threat

Too many organisations treat secure IT disposal as an afterthought. Once a laptop or hard drive is no longer in use, it’s often left to gather dust or sent to recycling without proper data wiping. That’s a major risk. Sensitive information doesn’t disappear when a...

WD expands NAS solution

WD has expanded its suite of network attached storage (NAS) solutions with four new products that address the increasing demands for content storage, management, protection and streaming among prosumers, creative professionals and small businesses. The My Cloud Expert...

read more

The top five DDoS protection myths

Distributed denial of service (DDoS) attacks have evolved to become a lot more sinister than they once were.
Yet too many organisations are pinning their defence hopes on outdated and ineffective solutions, or even gambling by having no defences at all, says Bryan Hamman, Territory manager of Arbor Networks. These risky approaches are based on the top DDoS myths in organisations today.

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>