<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

How to outsmart zero-day threats in a hyperconnected world

Cyber threats are evolving faster than ever. Among them, zero-day exploits stand out as one of the most unpredictable and damaging. By Avinash Gupta, head of Centre of Excellence at In2IT Technologies These attacks strike before a fix exists, leaving organisations...

Check Point adds AI Cloud Protect powered by Nvidia BlueField

Check Point Software Technologies is working with Nvidia to deliver an integrated security solution built for AI factories. AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference...

What the history of cyber threats can teach us about AI attacks

The greatest threat in cybersecurity right now isn’t the artificial intelligence of the future; it’s the human oversight of the past. For all the sophistication of modern attacks, the most devastating breaches are often echoes of old mistakes written in new code. By...

How SA businesses can safeguard themselves from cybersecurity breaches

Cybercriminal activity in South Africa surged by 14% between July 2024 and July 2025, according to Check Point Research’s Global Threat Intelligence Report. This rising threat affects businesses of all sizes, with recent cyberattacks on state-owned airline South...

The new cyber-norm

Today is D-Day for banks and the City of Johannesburg to pay ransom demands sent through by hackers last week. Bryan Hamman, Regional Director at NETSCOUT, which offers NETSCOUT Arbor, specialising in advanced DDos protection solutions, offers this explanation of DDoS...

read more

Security spend on the rise

The global cybersecurity market is booming, the demand for cybersecurity solutions is huge and security spend has already started outpacing IT spend. Adoption in South Africa is not yet growing at the same rate, but there is a strong growth in interest and...

read more

Watch your perimeter

Imagine being able to detect if an intruder is attempting to breach the perimeter of a property in a remote location? Imagine knowing that your fence can detect the intrusion, notifying the authorities and preventing the intruders from getting any closer to their end...

read more

Securing abandoned mines

In mineral-rich South Africa, mining is an important part of the GDP employing nearly half a million people. Vanessa Tyne, senior KAM and team lead at Axis Considering that the sector consists of diamonds, gold, platinum, and coal, it is easy to understand why local...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>