<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Identity under siege: The new order of security in 2026

Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity, writes Caesar Tonkin, MD of Armata...

Architecting security in fintech: It’s in the whiteboard details

African organisations face an average of 3 153 cyberattacks a week, which is around 60% higher than the global average. The continent is sitting right in the proverbial thick of the threats, with fraud and attacks costing companies thousands. The African financial...

The future of PC security is multi-layered and managed

Twenty years ago, enterprise security was straightforward in that enterprise devices never left the premises. By Werner Joubert, commercial SYS business director (South Africa & SADC) at ASUS Perimeter security proved sufficient as business networks were...

Secure multicloud environments enable compliance, resilience and competitiveness

In multicloud environments, security should be about preserving an organisation’s ability to operate and innovate, writes Allan Juma, lead cybersecurity engineer at ESET. South Africa had just emerged from a fairly well-received budget, positive signs from ratings...

Malware never sleeps

Malware is always changing, adapting, being rewritten and re-released in a seemingly infinite number of ways, with the express intention of making your life difficult – and making the writers or owners of the code as much money as possible.  Security threats have...

read more

Vivotek protects hotel guests

Hotels may be places of relaxation, but they require stringent security to protect guests and their valuables. South African Patrol Security, which provides guarding services at various Southern Sun hotels in KwaZulu-Natal, recently upgraded the surveillance system at...

read more

Emulating the enemy

Threat emulation is a critical technique in achieving more effective network security. "Know your enemy as well as you know yourself" is a frequently-quoted statement in IT security, says Doros Hadjizenonos, sales manager at Check Point South Africa.  However, one of...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>