
How you could thrive without passwords
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals, writes By Kumar Vaibhav, lead senior solution architect:...

The role of advanced technologies in ransomware recovery
The threat of ransomware attacks looms large, compelling organisations to rethink their data management strategies. By Modeen Malick, principal systems engineer at Commvault As businesses increasingly adopt cloud technologies, the complexities of maintaining...
Kaspersky extends targeted attack protection
Kaspersky has announced a major update to its Kaspersky Anti Targeted Attack (KATA). With the launch of KATA 7.0, organisations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats detection...
From parliament to the public: The domino effect of social media hacks
The recent compromise of one of the South African Parliament's Youtube accounts, to promote a fraudulent "$Ramaphosa" cryptocurrency token, underscores the insidious nature of scammers impersonating trusted figures or institutions and abusing their public currency:...
As crypto grows, don’t lose sight of security
As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security, writes Richard Frost, head of technology and innovation at Armata Cyber Security. The Consensus Web3 and Crypto Perception...
Trend Micro, Intel weed out covert threats
Trend Micro has announced a new collaboration with Intel designed to help joint enterprise customers protect critical systems from stealthy threats, including fileless malware and advanced ransomware. When Trend's proactive security platform and Intel's technology are...
Kaspersky consumer solution gets top award
Kaspersky Standard, the primary Kaspersky Consumer Portfolio plan, has received the annual Top-Rated Product Award by AV-Comparatives for high results across the whole series of consumer products tests in 2024. The product also showed outstanding performance in False...

Strategic partnerships play a role in municipal cybersecurity
Strategic partnerships are essential for enhancing cybersecurity in South African municipalities. By Kumar Vaibhav, lead senior solution architect: cybersecurity at In2IT As cyber threats evolve and become more sophisticated, local governments face significant...
Red Hat debuts latest version of Red Hat OpenShift
Red Hat has announced the general availability of Red Hat OpenShift 4.18, with new features and capabilities designed to streamline operations and security across IT environments, delivering greater consistency to all applications, from cloud-native and AI-enabled to...
AI and AI-agents move the cybersecurity goalposts
Artificial Intelligence is no longer just a tool — it is a gamechanger in our lives, our work as well as in both cybersecurity and cybercrime. While businesses leverage AI to enhance defences, cybercriminals are weaponising AI to make these attacks more scalable and...
Check Point partners with Cardano
Check Point Software Technologies and public crypto currency platform Cardano have partnered to develop and deliver a comprehensive real-time security solution for blockchain. As blockchain technology continues to gain traction across industries, the $1,5-billion...
The future of cybersecurity resilience relies on recruiting more women
Julie Noizeux Inder, cybersecurity specialist at Fortinet, understands the challenges that women face when entering traditionally male-dominated fields like cybersecurity. This International Women's Day, she highlights a concerning paradox: while cybercriminals have...