<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

AI is silently turning into your organisation’s biggest cyber threat

AI didn’t storm in with board approval or a security checklist, writes By John Mc Loughlin, CEO of J2. It crept in unnoticed, drafting emails faster than you can read them, generating code on the fly, automating workflows behind the scenes, and empowering support...

AI and cybersecurity: Trust must come before scale

As artificial intelligence continues its rapid move from experimentation into production environments, 2025 marked a turning point for how organisations approach AI adoption – particularly in the context of cybersecurity, governance and enterprise risk. According to...

How SaaS supply chains became cybersecurity’s new weak link

Software-as-a-Service (SaaS) is no longer an IT choice; it’s the operating system of business itself. By Avinash Gupta, head of centre of excellence at In2IT Technologies From Salesforce to Workday, Microsoft 365 to Slack, the SaaS layer now underpins collaboration,...

How to spot and avoid cyber scams during the 2026 Winter Competitions

The 2026 Winter Olympic Games are in full swing, captivating sports fans worldwide. However, the Games also serve as an opportunity for scammers to strike with different kinds of cyber fraud. Kaspersky has identified some of the key scams targeting fans right now –...

The top five DDoS protection myths

Distributed denial of service (DDoS) attacks have evolved to become a lot more sinister than they once were.
Yet too many organisations are pinning their defence hopes on outdated and ineffective solutions, or even gambling by having no defences at all, says Bryan Hamman, Territory manager of Arbor Networks. These risky approaches are based on the top DDoS myths in organisations today.

read more

Mitigating zero-day threats

Zero-day exploits, which take advantage of a security vulnerability on the same day that the vulnerability becomes generally known, have long been a thorn in security practitioners’ sides. These attacks happen quickly, before the vendor or security community as a...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>