<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Built by hackers, cybersecurity academy aims to close the skills gap

Over 2 000 cybersecurity incidents are said to be reported to Information Regulator over the past year. But, according to experts, the actual number of threats impacting South African companies is more likely to be in the realm of 2 000 per week. It is estimated that...

Check Point debuts Quantum Firewall Software R82.10

Check Point Software Technologies has announced its new Check Point Quantum Firewall Software, R82.10, introducing 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments and simplify Zero Trust across hybrid networks. “As...

Securing the smart fleet: Protecting SA’s logistics sector

Contributing around 10% to 12% of South Africa’s GDP, the transport and logistics sector supports almost every part of the country’s economic activity. By Doros Hadjizenonos, regional director: southern Africa at Fortinet Every item that reaches a store shelf, factory...

Securing SA’s digital future

South Africa is currently undergoing a rapid digital transformation. From mobile banking and smart infrastructure to cloud-based services and AI-powered platforms, technology is reshaping how we live, work, and govern. By Kumar Vaibhav, lead senior solution architect:...

When cyber laws backfire …

Regulation was designed to protect customers, curb risk, and hold businesses accountable. But today, it’s often doing the opposite - creating impossible trade-offs, punishing transparency, and turning defenders into accidental offenders. By John Mc Loughlin, CEO of ...

read more

CIMA launches 2025 Cybersecurity Tool 

The Chartered Institute of Management Accountants (CIMA) has launched the latest version of its CGMA Cybersecurity Tool, designed to help finance professionals tackle the growing threat of cyberattacks through robust risk management, response, and remediation...

read more
When likes become a liability …

When likes become a liability …

The use of social media at work – especially on devices connected to internal networks – is putting South African businesses at risk of data breaches and cyberattacks. With no specific laws governing social media use in the workplace, many businesses operate without...

read more

Five ways to outsmart cybercriminals

It often starts with something small: a WhatsApp from a number you don’t recognise, an email that looks like it’s from your bank, or a limited-time offer that seems too good to ignore. Within minutes, a single click or slip of the tongue can cost you thousands....

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>