<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

What the history of cyber threats can teach us about AI attacks

The greatest threat in cybersecurity right now isn’t the artificial intelligence of the future; it’s the human oversight of the past. For all the sophistication of modern attacks, the most devastating breaches are often echoes of old mistakes written in new code. By...

How SA businesses can safeguard themselves from cybersecurity breaches

Cybercriminal activity in South Africa surged by 14% between July 2024 and July 2025, according to Check Point Research’s Global Threat Intelligence Report. This rising threat affects businesses of all sizes, with recent cyberattacks on state-owned airline South...

Sophos announces Security Operations portfolio evolution

Sophos has announced significant enhancements to its Security Operations portfolio. In the months since the acquisition of Secureworks for $859-million, Sophos has made transformative progress, unifying technologies, expertise, and services from across its expanded...

When cyber laws backfire …

Regulation was designed to protect customers, curb risk, and hold businesses accountable. But today, it’s often doing the opposite - creating impossible trade-offs, punishing transparency, and turning defenders into accidental offenders. By John Mc Loughlin, CEO of ...

Reinventing network camera security

Now in its seventh generation and celebrating its twentieth anniversary, the Axis ARTPEC chip was launched in 1999 designed to optimise network video. By Brendon Holl, sales manager: Africa at Axis Communications Today, it forms the basis for the essential product...

read more

Own your digital identity this summer

OThe arrival of summer is the perfect opportunity for young South Africans to log on to the worldwide web and claim their digital identities within the dotZA (.ZA) and dotAfrica (.africa) namespaces. “Schools are out and the youth are now able to turn their bright...

read more

Extending security to the cloud

Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances or as cloud services to protect the outer perimeter security in branch offices. Troye technical director Kurt...

read more

Mimecast challenges Shadow IT

Mimecast has announced the release of added application visibility and control capabilities to its Mimecast Web Security service. Application Visibility and Control will help Mimecast customers overcome the challenge of Shadow IT by uncovering cloud app usage within...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>