<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

How to outsmart zero-day threats in a hyperconnected world

Cyber threats are evolving faster than ever. Among them, zero-day exploits stand out as one of the most unpredictable and damaging. By Avinash Gupta, head of Centre of Excellence at In2IT Technologies These attacks strike before a fix exists, leaving organisations...

Check Point adds AI Cloud Protect powered by Nvidia BlueField

Check Point Software Technologies is working with Nvidia to deliver an integrated security solution built for AI factories. AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference...

What the history of cyber threats can teach us about AI attacks

The greatest threat in cybersecurity right now isn’t the artificial intelligence of the future; it’s the human oversight of the past. For all the sophistication of modern attacks, the most devastating breaches are often echoes of old mistakes written in new code. By...

How SA businesses can safeguard themselves from cybersecurity breaches

Cybercriminal activity in South Africa surged by 14% between July 2024 and July 2025, according to Check Point Research’s Global Threat Intelligence Report. This rising threat affects businesses of all sizes, with recent cyberattacks on state-owned airline South...
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>