<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Navigating cybersecurity in 2026

For years, the cybersecurity industry has warned that threats are becoming ‘more sophisticated’. By Beth Miller, field CISO at Mimecast In reality, attackers aren’t getting smarter, they’re simply leveraging new tech to exploit the same long-standing vulnerabilities...

Creating a culture of cyber awareness across SA requires a mind shift

Let’s be honest, when most people hear “cybersecurity”, their minds jump straight to firewalls, passwords, and maybe a stern compliance checklist. By Tshepo Mokoena, chairperson at In2IT Technologies However, cybersecurity is no longer the sole domain of IT...

Cloud security demands a smarter, managed approach

As more businesses move their operations to the cloud, securing these environments has become a strategic imperative. By Ryan Boyes, governance, risk and compliance officer at Galix Fortinet’s 2025 report reveals that 35% of IT security budgets are now dedicated to...

Your old hardware could be your most expensive cyber threat

Too many organisations treat secure IT disposal as an afterthought. Once a laptop or hard drive is no longer in use, it’s often left to gather dust or sent to recycling without proper data wiping. That’s a major risk. Sensitive information doesn’t disappear when a...

VMware vSphere 6 boosts hybrid cloud

VMware has announced VMware vSphere 6, the newest edition of the industry-defining virtualisation solution for the hybrid cloud and foundation for the software-defined data centre. With more than 650 new features and innovations, VMware vSphere 6 will provide...

read more

IAM trends for 2015

CA Technologies announced five key trends for security and identity and access management (IAM) that will impact organisations and security professionals in 2015 as they compete in the application economy. “The impact of data breaches in 2014, coupled with the demands...

read more

Smart homes easy prey for hackers

While the increasing use of home automation technology to create your version of a “smart home” may be trendy and seem practical, Richard Keymer, head of pre-sales at SecureData Africa, warns of the flip-side in that once an automation system is established and can be operated remotely online, then chances are it can be hacked.

read more

Predicting DDoS attacks

Distributed denial of Service (DDoS) attacks are back in the news; it seems that barely a month goes by without media reports of a Web site or service being brought down by a DDoS attack. Sony’s PlayStation Network again became the victim of such an attack recently,...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>