<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Why we have to let (the right) AI into our emails

With artificial intelligence (AI) now augmenting up to 80% of phishing emails and cybercriminals constantly upping their games, relying on employee training alone is both insufficient and damaging. To manage human risk effectively in this new landscape, organisations...

Why human error is our biggest cyber threat

Cyber-attacks are getting smarter, faster and more personal, and even the best security technology can’t stop them if people keep clicking on the wrong links. Craig Freer, director of managed services provider Qwerti, says businesses are fighting a new kind of battle,...

SA’s silent APP fraud time bomb

We made payments fast. Fraudsters said thank you. By Tim Chadwick, CEO of Chadwicks South Africa is racing into real time payments, PayShap IDs, instant EFTs, money that leaves in seconds. That is good for cash flow and great for crooks. The hottest scam in the world...

The desperation effect: How financial anxiety makes you click the scam link

The narrative of cybersecurity risk often revolves around sophisticated hacking tools or zero-day vulnerabilities. Yet, the most significant threat to South Africans isn't a technical flaw – it's an emotional vulnerability rooted in a national financial crisis. The...

Reinventing network camera security

Now in its seventh generation and celebrating its twentieth anniversary, the Axis ARTPEC chip was launched in 1999 designed to optimise network video. By Brendon Holl, sales manager: Africa at Axis Communications Today, it forms the basis for the essential product...

read more

Own your digital identity this summer

OThe arrival of summer is the perfect opportunity for young South Africans to log on to the worldwide web and claim their digital identities within the dotZA (.ZA) and dotAfrica (.africa) namespaces. “Schools are out and the youth are now able to turn their bright...

read more

Extending security to the cloud

Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances or as cloud services to protect the outer perimeter security in branch offices. Troye technical director Kurt...

read more

Mimecast challenges Shadow IT

Mimecast has announced the release of added application visibility and control capabilities to its Mimecast Web Security service. Application Visibility and Control will help Mimecast customers overcome the challenge of Shadow IT by uncovering cloud app usage within...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>