<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Identity under siege: The new order of security in 2026

Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity, writes Caesar Tonkin, MD of Armata...

Architecting security in fintech: It’s in the whiteboard details

African organisations face an average of 3 153 cyberattacks a week, which is around 60% higher than the global average. The continent is sitting right in the proverbial thick of the threats, with fraud and attacks costing companies thousands. The African financial...

The future of PC security is multi-layered and managed

Twenty years ago, enterprise security was straightforward in that enterprise devices never left the premises. By Werner Joubert, commercial SYS business director (South Africa & SADC) at ASUS Perimeter security proved sufficient as business networks were...

Secure multicloud environments enable compliance, resilience and competitiveness

In multicloud environments, security should be about preserving an organisation’s ability to operate and innovate, writes Allan Juma, lead cybersecurity engineer at ESET. South Africa had just emerged from a fairly well-received budget, positive signs from ratings...

Check Point announces R77

Check Point Software Technologies, a worldwide leader in securing the Internet, has announced the availability of Check Point R77, the latest release for its award-winning Software Blade Architecture. The Check Point R77 brings together preventative security...

read more

Westcon offers SonicOS 5.9

Westcon Security customers can now take immediate advantage of Dell Software’s largest release of its SonicOS operating system for the Dell SonicWALL Next-Generation Firewalls (NGFWs) and unified threat management (UTM), by way of SonicOS 5.9. According to Andrew...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>