<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Troye debuts Arctic Wolf’s Aurora Endpoint platform

Troye has launched the Aurora Endpoint suite, a robust platform providing protection, detection, and response capabilities across every stage of an organisation’s cybersecurity maturity. Helen Kruger, MD of Troye, says with the new Aurora Endpoint platform, clients...

What to do in the first 24 hours after a ransomware attack

A ransomware attack is a nightmare scenario for any organisation. It’s disruptive, costly, and often deeply damaging to your reputation. By Richard Ford, chief technology officer at Integrity360 How you respond in the first 24 hours will determine the difference in...

Traditional defences are no longer enough

From finding creative recipes or drafting business emails to creating images for a small business’s social media posts, generative artificial intelligence (GenAI) tools like ChatGPT and Midjourney are rapidly becoming a part of our daily lives. But, along with its...

SA is a prime target for ransomware attacks

Ransomware attacks have become a significant threat to South African businesses, with the country emerging as a top target in Africa. By Kumar Vaibhav, lead senior solution architect: cybersecurity at In2IT The prevalence of these attacks is driven by a combination of...

Seacom, Sophos secure SMEs

Seacom has joined forces with Sophos to provide a next generation security solution called On-Premise Security to cost-conscious small and medium enterprises (SMEs) across South Africa. Seacom's On-Premise Security is a full-suite solution that uses Sophos' XG...

read more

The dark side of apps

With the world's population of mobile phone users set to reach 4,68-million this year - 2,7-billion of those being smartphone users, mobile device security threats are on the rise. "Apps pose a real problem for mobile users, who give them sweeping permissions, but...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>