<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Ransomware in 2025 and what to expect in 2026

The economic toll of ransomware could be staggering, writes Fabio Assolini, head of research centre: Americas and Europe, Global Research & Analysis Team at Kaspersky. VDC Research and Kaspersky conducted an estimation which showed that in the manufacturing sector...

The business case for MDR: Protecting clients when threats don’t sleep

For many South African organisations, the real test of their cybersecurity resilience is not whether they have the right tools in place, but whether anyone is actively watching their environment when attackers make their move and can respond immediately when something...

 ‘I have nothing to hide’ is the most comfortable lie in cybersecurity

International Data Privacy Day (28 January) usually brings a wave of advice about passwords and privacy settings. Most of us tune it out. We fall back on the comfortable, dangerous cop-out: "I am boring. I have nothing to hide." Richard Ford, chief technology officer...

Why you must train your AI agents just as hard as your employees

As Data Privacy Day approaches (28 January 2026), the conversation around protecting information has shifted yet again. For years, the mantra was simple: train your people. But in 2026, the workforce has expanded. We have arrived at a point where we are managing the...

The top five DDoS protection myths

Distributed denial of service (DDoS) attacks have evolved to become a lot more sinister than they once were.
Yet too many organisations are pinning their defence hopes on outdated and ineffective solutions, or even gambling by having no defences at all, says Bryan Hamman, Territory manager of Arbor Networks. These risky approaches are based on the top DDoS myths in organisations today.

read more

Mitigating zero-day threats

Zero-day exploits, which take advantage of a security vulnerability on the same day that the vulnerability becomes generally known, have long been a thorn in security practitioners’ sides. These attacks happen quickly, before the vendor or security community as a...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>