<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Costs, timelines and stumbling blocks: What it takes to build an SOC

For most organisations planning to build a Security Operations Center (SOC), the question is no longer whether to invest, but what it will take to make it operational. The findings of Kaspersky’s global study reveal that behind seemingly similar plans, companies face...

Rethinking antivirus in a modern security landscape

Antivirus has come a long way since its early signature-based roots, but even the most advanced versions cannot keep up with the speed and complexity of current cyber threats. By Ivaan Captieux, security consultant at Galix Attacks now bypass traditional controls...

Check Point accelerates secure AI data centre with Nvidia DSX Air

Check Point Software Technologies has announced the integration of its AI Factory Firewall and comprehensive AI security stack with Nvidia DSX Air, a cloud-based simulation and validation platform. The collaboration allows organisations to pre-validate security-aware...

Microsoft 365 security is a ticking time bomb

Across boardrooms and IT departments, a dangerous assumption continues to grow that because data resides in Microsoft 365 and Azure it is automatically secure, writes John Mc Loughlin CEO of J2 This belief is fundamentally flawed and creates a false sense of...

Check Point secures AI factories with Nvidia

Check Point Software Technologies’ AI Cloud Protect is now part of Nvidia Enterprise AI Factory validated design for AI runtime cyber security, enhanced protection, and robust infrastructure acceleration capabilities. “The integration of Check Point AI Cloud...

read more

Navigating cybersecurity in 2026

For years, the cybersecurity industry has warned that threats are becoming ‘more sophisticated’. By Beth Miller, field CISO at Mimecast In reality, attackers aren’t getting smarter, they’re simply leveraging new tech to exploit the same long-standing vulnerabilities...

read more

Visibility that drives real resilience

Strong cybersecurity begins with the ability to see everything, writes Roy Alves, sales director of J2. Visibility starts with a real time view of the client’s entire digital estate across endpoints, networks, cloud and hybrid environments. This approach relies on...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>