<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Identity under siege: The new order of security in 2026

Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity, writes Caesar Tonkin, MD of Armata...

Architecting security in fintech: It’s in the whiteboard details

African organisations face an average of 3 153 cyberattacks a week, which is around 60% higher than the global average. The continent is sitting right in the proverbial thick of the threats, with fraud and attacks costing companies thousands. The African financial...

The future of PC security is multi-layered and managed

Twenty years ago, enterprise security was straightforward in that enterprise devices never left the premises. By Werner Joubert, commercial SYS business director (South Africa & SADC) at ASUS Perimeter security proved sufficient as business networks were...

Secure multicloud environments enable compliance, resilience and competitiveness

In multicloud environments, security should be about preserving an organisation’s ability to operate and innovate, writes Allan Juma, lead cybersecurity engineer at ESET. South Africa had just emerged from a fairly well-received budget, positive signs from ratings...

Cyberoam expands Central Console appliances

Cyberoam, a leading global provider of network security solutions, announced the Next-Generation Management series (CCC NM) of its Cyberoam Central Console appliances for Enterprises and MSSPs. Combining new powerful hardware and software architecture, the CCC NM...

read more

Kemp announces LoadMaster LMOS

Web application firewall (WAF) services will be natively integrated in the Kemp Technologies LoadMaster load balancer operating system (LMOS). This will enable secure deployment of Web applications preventing Layer-7 attacks, while maintaining core load balancing...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>