<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

New training scenarios from Kaspersky

Kaspersky has expanded its flagship awareness platform, Kaspersky Interactive Protection Simulation (KIPS), introducing new and updated scenarios that reflect the evolving cyberthreat landscape. The release aims to help corporations, banks and IT companies enhance...

Check Point secures AI factories with Nvidia

Check Point Software Technologies’ AI Cloud Protect is now part of Nvidia Enterprise AI Factory validated design for AI runtime cyber security, enhanced protection, and robust infrastructure acceleration capabilities. “The integration of Check Point AI Cloud...

PCI DSS compliance is a business essential, not an IT task

Payment Card Industry Data Security Standard (PCI DSS) compliance has often been viewed as something to focus on only when required, such as when a breach makes headlines or a bank requests proof of compliance. By Simeon Tassev, MD and QSA at Galix This reactive...

Unlock stronger security with continuous Attack Surface Management

Every organisation today operates in a complex, interconnected digital environment that extends far beyond its traditional perimeter. By Nemanja Krstić, operations manager: managed security services at Galix Cloud workloads, Software-as-a-Service (SaaS) applications,...

CIMA launches 2025 Cybersecurity Tool 

The Chartered Institute of Management Accountants (CIMA) has launched the latest version of its CGMA Cybersecurity Tool, designed to help finance professionals tackle the growing threat of cyberattacks through robust risk management, response, and remediation...

read more
When likes become a liability …

When likes become a liability …

The use of social media at work – especially on devices connected to internal networks – is putting South African businesses at risk of data breaches and cyberattacks. With no specific laws governing social media use in the workplace, many businesses operate without...

read more

Five ways to outsmart cybercriminals

It often starts with something small: a WhatsApp from a number you don’t recognise, an email that looks like it’s from your bank, or a limited-time offer that seems too good to ignore. Within minutes, a single click or slip of the tongue can cost you thousands....

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>