<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Architecting security in fintech: It’s in the whiteboard details

African organisations face an average of 3 153 cyberattacks a week, which is around 60% higher than the global average. The continent is sitting right in the proverbial thick of the threats, with fraud and attacks costing companies thousands. The African financial...

The future of PC security is multi-layered and managed

Twenty years ago, enterprise security was straightforward in that enterprise devices never left the premises. By Werner Joubert, commercial SYS business director (South Africa & SADC) at ASUS Perimeter security proved sufficient as business networks were...

Secure multicloud environments enable compliance, resilience and competitiveness

In multicloud environments, security should be about preserving an organisation’s ability to operate and innovate, writes Allan Juma, lead cybersecurity engineer at ESET. South Africa had just emerged from a fairly well-received budget, positive signs from ratings...

Cisco reimagines security for the agentic workforce

Cisco has announced significant security innovations designed for the agentic AI ecosystem, where software no longer just answers questions - it acts. At RSA Conference 2026, Cisco introduced solutions to address AI security issues and remove a top barrier to agent...

Predicting DDoS attacks

Distributed denial of Service (DDoS) attacks are back in the news; it seems that barely a month goes by without media reports of a Web site or service being brought down by a DDoS attack. Sony’s PlayStation Network again became the victim of such an attack recently,...

read more

Kaspersky solution lauded by MRG Effitas

Based on the results of efficacy assessments conducted in Q3 2014, MRG Effitas has certified Kaspersky Internet Security as a solution that provides effective protection for online transactions. In particular, the test for protection against man-in-the-middle attacks (interfering with the data transmission protocol in order to distort data) was removed.

read more

Thermal imaging cameras mitigate poaching

Effective monitoring is key in the fight against rhino poaching. Using thermal imaging cameras with advanced detection capability can offer a more proactive solution to stopping poachers. Technology not only helps to protect the lives of the rangers, it can also mean the difference between pre-empting the death of a rhino, or hunting for the killers after the fact, when it is already too late.

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>