<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Continuous threat exposure management the new cybersecurity imperative

The old playbook of periodic vulnerability scans and annual security audits no longer suffices when attackers operate in real time, using automation and artificial intelligence (AI) to exploit the tiniest cracks in digital defences. By Saurabh Prasad, senior solution...

Top 10 cybersecurity trends and terrors of 2026

There is one word that describes cybersecurity right now, writes Jeanette Simpson, head of product management at Armata Cyber Security, and that’s ‘acceleration’. Attacks are scaling faster. Ransomware activity has increased 25% year-on-year and the number of...

Deepfake fraud escalates as detection technology enters SA

Certified AI Access, a South African AI trust and risk infrastructure company, and Reality Defender, a deepfake detection platform, today announced a partnership to deploy enterprise-grade deepfake detection technology across South Africa’s financial sector. The...

Costs, timelines and stumbling blocks: What it takes to build an SOC

For most organisations planning to build a Security Operations Center (SOC), the question is no longer whether to invest, but what it will take to make it operational. The findings of Kaspersky’s global study reveal that behind seemingly similar plans, companies face...
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>