<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Rethinking antivirus in a modern security landscape

Antivirus has come a long way since its early signature-based roots, but even the most advanced versions cannot keep up with the speed and complexity of current cyber threats. By Ivaan Captieux, security consultant at Galix Attacks now bypass traditional controls...

Check Point accelerates secure AI data centre with Nvidia DSX Air

Check Point Software Technologies has announced the integration of its AI Factory Firewall and comprehensive AI security stack with Nvidia DSX Air, a cloud-based simulation and validation platform. The collaboration allows organisations to pre-validate security-aware...

Microsoft 365 security is a ticking time bomb

Across boardrooms and IT departments, a dangerous assumption continues to grow that because data resides in Microsoft 365 and Azure it is automatically secure, writes John Mc Loughlin CEO of J2 This belief is fundamentally flawed and creates a false sense of...

The real ROI of security: Moving beyond cost to performance

In South Africa, security is still widely viewed as a grudge purchase, a necessary expense rather than a strategic investment. Too often, buying decisions focus on upfront price, with the assumption that most security products offer similar protection. But the reality...

WD expands NAS solution

WD has expanded its suite of network attached storage (NAS) solutions with four new products that address the increasing demands for content storage, management, protection and streaming among prosumers, creative professionals and small businesses. The My Cloud Expert...

read more

The top five DDoS protection myths

Distributed denial of service (DDoS) attacks have evolved to become a lot more sinister than they once were.
Yet too many organisations are pinning their defence hopes on outdated and ineffective solutions, or even gambling by having no defences at all, says Bryan Hamman, Territory manager of Arbor Networks. These risky approaches are based on the top DDoS myths in organisations today.

read more

Mitigating zero-day threats

Zero-day exploits, which take advantage of a security vulnerability on the same day that the vulnerability becomes generally known, have long been a thorn in security practitioners’ sides. These attacks happen quickly, before the vendor or security community as a...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>