<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Zero trust begins with the right security partner

As businesses move beyond traditional network boundaries, the old “castle and moat” model of security is no longer effective. In a world of hybrid work, cloud platforms and mobile devices, implicit trust within a network is a major vulnerability. By Ivaan Captieux,...

Guardz partners with Check Point Software on email security for MSPs

Guardz has announced a new strategic technology partnership with Check Point to embed Harmony Email directly into the Guardz platform. The collaboration enhances Guardz’s AI-native, unified cybersecurity platform with Check Point’s patented, inline API-based email...

Cluttered desktops are a cybersecurity nightmare

Digital hoarding poses a significant and often underestimated cybersecurity risk that extends far beyond a simple productivity issue, argues Anna Collard, senior vice-president of content strategy and CISO advisor at KnowBe4 Africa. Like a garage slowly filling with...

Securing AI agents through smarter ID management

The conversation about artificial intelligence in South Africa has shifted rapidly over the past year. By Boland Lithebe, security lead for Accenture, Africa What was once the stuff of conferences and pilot projects is now quietly embedding itself in boardrooms and...
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>