<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

SA CISOs facing burnout epidemic. AI is the cause – and solution

South African CISOs are operating in a perfect storm. The rising volume and sophistication of attacks, constrained budgets, and a deepening skills shortage are adding to the mental strain of alert fatigue and the growing expectations from boards. While AI holds a...

AI is silently turning into your organisation’s biggest cyber threat

AI didn’t storm in with board approval or a security checklist, writes By John Mc Loughlin, CEO of J2. It crept in unnoticed, drafting emails faster than you can read them, generating code on the fly, automating workflows behind the scenes, and empowering support...

AI and cybersecurity: Trust must come before scale

As artificial intelligence continues its rapid move from experimentation into production environments, 2025 marked a turning point for how organisations approach AI adoption – particularly in the context of cybersecurity, governance and enterprise risk. According to...

How SaaS supply chains became cybersecurity’s new weak link

Software-as-a-Service (SaaS) is no longer an IT choice; it’s the operating system of business itself. By Avinash Gupta, head of centre of excellence at In2IT Technologies From Salesforce to Workday, Microsoft 365 to Slack, the SaaS layer now underpins collaboration,...

Cyberoam expands Central Console appliances

Cyberoam, a leading global provider of network security solutions, announced the Next-Generation Management series (CCC NM) of its Cyberoam Central Console appliances for Enterprises and MSSPs. Combining new powerful hardware and software architecture, the CCC NM...

read more

Kemp announces LoadMaster LMOS

Web application firewall (WAF) services will be natively integrated in the Kemp Technologies LoadMaster load balancer operating system (LMOS). This will enable secure deployment of Web applications preventing Layer-7 attacks, while maintaining core load balancing...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>