<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Check Point to integrate AI Defense Plane with Google Cloud

Check Point Software Technologies will serve as a launch partner with Google Cloud to integrate Check Point's AI Defense Plane with Google Cloud's Gemini Enterprise Agent Platform. The integration combines centralised agent control with contextual intelligence and...

Man in the middle – the silent threat hiding in encrypted traffic

For most South Africans, the padlock in a browser bar feels like a seal of trust. It’s a comforting sign that says, “Your connection is secure”. But in the digital age, that confidence can be dangerously misplaced, writes Saurabh Prasad, senior solution architect at...

Rising to the era of AI-powered cyber defenve

The world of cybersecurity has fundamentally changed writes Anthony Grieco, senior vice-president and chief security & trust Officer at Cisco. Today, I’m proud to share that Cisco is joining the world’s most critical cyber defenders to...

Identity under siege: The new order of security in 2026

Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity, writes Caesar Tonkin, MD of Armata...

Access management key to secure data

There’s a quip in the IT industry: who is driving digital transformation in your company: the CEO, the CIO or Covid? And, of course, the response is generally Covid. While Covid has precipitated organisations along an accelerated digitalisation path, the very speed...

read more

Product security is critical to cyber security

By Herman Kannenberg, Head of Legal Affairs and Cyber Security, Huawei South Africa - If you follow the news, you'll have noticed that there has been a significant uptick in the number of cybersecurity-related articles and stories lately. This is because cyber-attacks...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>