<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Is password-based security ending?

The password is no longer a fortress in and of itself. In a landscape where attackers effortlessly bypass traditional defences, passwords have become more of a revolving door to a greater security fortress – one that needs to be built on resilience, not strength. By...

Mimecast enhances data governance, compliance across collaboration tools

Mimecast has announced a new solution with Google Workspace to enhance governance and compliance capabilities within the Workspace suite of collaboration and productivity tools. This solution enables comprehensive support for key compliance use cases such as...

Trend Micro to deliver secure infrastructure at scale

Trend Micro will deliver a suite of co-developed, pre-approved OEM appliance offerings in collaboration with Dell Technologies and Nvidia to support secure, AI-powered infrastructure solutions that scale with the needs of global enterprises. Kevin Simzer, chief...

Arbor Cloud DDoS protection ranked Platinum

NetScout, a leading provider of enterprise performance management, carrier service assurance, cybersecurity and DDoS protection solutions, has earned top honours in the 2025 Enterprise Management Associates (EMA) PRISM report on distributed denial-of-service (DDoS)...

The growing costs of cybercrime

Modern enterprises face an onslaught of cyberattacks from many quarters and must not only be prepared to contend with the direct costs of potential breaches, but also with spiralling indirect costs, such as compliance fines and reputational damage. By Simeon Tassev,...

read more

Robots take up the cybersecurity fight

The massive surge in cybercrime, the ever-increasing number of threat vectors, and a critical skills shortage has left organisations feeling more vulnerable to cyberattacks than ever before. With exponentially more ransomware incidents being reported than there are...

read more

Look again at security automation

The sheer scale and pace of today’s cyber threats could prove overwhelming for the security department, outpacing its resources. Hila Meller, BT Security, Global Head of Sales shares BT’s own learnings on the top five things to consider for your security automation...

read more

Putting the safe into social.

In February 2021, the data from 500-million LinkedIn users was leaked by hackers. In June 2021, more than 700-million LinkedIn users had their data leaked and put up for sale. In June 2022, the FBI said that the fraud on LinkedIn posed a significant threat to the...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>