<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

For effective attack surface management, think like an attacker

While there’s a lot of talk around attack surface management (ASM) it doesn’t always clarify for businesses how they should  approach this crucial matter. By Christo Coetzer, director and CEO at BlueVision Firstly, it’s important to emphasise that ASM not a technical...

Exabeam extends insider threat detection to AI agents

Exabeam has announced the integration of Google Agentspace and Google Cloud’s Model Armor telemetry into the New-Scale Security Operations Platform. The integration gives security teams the ability to monitor, detect, and respond to threats from AI agents acting as...

Cyber resilience with Dell PowerProtect

In today’s hyper-connected world, cyber threats are no longer just a possibility they’re an inevitability. Organisations across industries are grappling with increasingly sophisticated attacks that disrupt operations, compromise sensitive data and erode trust. By Musa...

What if your staff’s AI chats are hacked?

The rise of generative AI (GenAI) has changed how we work, live, and create. By Richard Ford, chief technology officer at Integrity360 For many employees, tools like ChatGPT and Copilot have become go-to assistants for everything from drafting emails and summarising...
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>