<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Navigating cybersecurity in 2026

For years, the cybersecurity industry has warned that threats are becoming ‘more sophisticated’. By Beth Miller, field CISO at Mimecast In reality, attackers aren’t getting smarter, they’re simply leveraging new tech to exploit the same long-standing vulnerabilities...

Creating a culture of cyber awareness across SA requires a mind shift

Let’s be honest, when most people hear “cybersecurity”, their minds jump straight to firewalls, passwords, and maybe a stern compliance checklist. By Tshepo Mokoena, chairperson at In2IT Technologies However, cybersecurity is no longer the sole domain of IT...

Cloud security demands a smarter, managed approach

As more businesses move their operations to the cloud, securing these environments has become a strategic imperative. By Ryan Boyes, governance, risk and compliance officer at Galix Fortinet’s 2025 report reveals that 35% of IT security budgets are now dedicated to...

Your old hardware could be your most expensive cyber threat

Too many organisations treat secure IT disposal as an afterthought. Once a laptop or hard drive is no longer in use, it’s often left to gather dust or sent to recycling without proper data wiping. That’s a major risk. Sensitive information doesn’t disappear when a...

Mitigating zero-day threats

Zero-day exploits, which take advantage of a security vulnerability on the same day that the vulnerability becomes generally known, have long been a thorn in security practitioners’ sides. These attacks happen quickly, before the vendor or security community as a...

read more

Check Point acquires Hyperwise

Check Point Software Technologies has announced the acquisition of Hyperwise. Hyperwise is a privately held, early-stage company that has developed a unique and cutting-edge CPU-level threat prevention engine that eliminates threats at the point of pre-infection. The...

read more

Security trends for 2015

2014 saw a seamlessly never-ending flow of cyber-attacks and data breaches, affecting companies of all sizes and across a variety of industries, from retailers and banks to government sites. Simon Campbell-Young, CEO of Phoenix Distribution, says 2015 can expect more...

read more

Panda gains in Gartner rankings

Panda Security has been included as a Visionary in the Gartner Magic Quadrant for Endpoint Protection Platforms, published on 22 December 2014 – for the seventh consecutive year. This year saw Panda improve their positioning within the quadrant, proving testament to...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>