<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Axis Communications signs CISA Secure by Design pledge

Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling its commitment to upholding and transparently communicating the cybersecurity posture of its products. A voluntary pledge...

Kaspersky enables independent transparency, accountability assessment

Kaspersky has released Protection beyond detection: Why trust and transparency decide your cybersecurity future, a new whitepaper based on an independent transparency and accountability assessment of 14 leading cybersecurity vendors. Kaspersky emerged as one of the...

Cisco debuts integrated AI security and safety framework

AI is no longer an experimental capability or a back-office automation tool: it is becoming a core operational layer inside modern enterprises. The pace of adoption is breathtaking. By Amy Chang, AI threat research and security team lead at Cisco Yet, according to...

Excuse me while I slip on past your security

Attackers are bypassing the very tools designed to prevent them from gaining access to the business, writes Richard Frost, head of technology solutions and consulting at Armata Cyber Security. AI-powered phishing has become the most virulent security threat to the...

When cyber laws backfire …

Regulation was designed to protect customers, curb risk, and hold businesses accountable. But today, it’s often doing the opposite - creating impossible trade-offs, punishing transparency, and turning defenders into accidental offenders. By John Mc Loughlin, CEO of ...

read more

CIMA launches 2025 Cybersecurity Tool 

The Chartered Institute of Management Accountants (CIMA) has launched the latest version of its CGMA Cybersecurity Tool, designed to help finance professionals tackle the growing threat of cyberattacks through robust risk management, response, and remediation...

read more
When likes become a liability …

When likes become a liability …

The use of social media at work – especially on devices connected to internal networks – is putting South African businesses at risk of data breaches and cyberattacks. With no specific laws governing social media use in the workplace, many businesses operate without...

read more

Five ways to outsmart cybercriminals

It often starts with something small: a WhatsApp from a number you don’t recognise, an email that looks like it’s from your bank, or a limited-time offer that seems too good to ignore. Within minutes, a single click or slip of the tongue can cost you thousands....

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>