<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Troye debuts Arctic Wolf’s Aurora Endpoint platform

Troye has launched the Aurora Endpoint suite, a robust platform providing protection, detection, and response capabilities across every stage of an organisation’s cybersecurity maturity. Helen Kruger, MD of Troye, says with the new Aurora Endpoint platform, clients...

What to do in the first 24 hours after a ransomware attack

A ransomware attack is a nightmare scenario for any organisation. It’s disruptive, costly, and often deeply damaging to your reputation. By Richard Ford, chief technology officer at Integrity360 How you respond in the first 24 hours will determine the difference in...

Traditional defences are no longer enough

From finding creative recipes or drafting business emails to creating images for a small business’s social media posts, generative artificial intelligence (GenAI) tools like ChatGPT and Midjourney are rapidly becoming a part of our daily lives. But, along with its...

SA is a prime target for ransomware attacks

Ransomware attacks have become a significant threat to South African businesses, with the country emerging as a top target in Africa. By Kumar Vaibhav, lead senior solution architect: cybersecurity at In2IT The prevalence of these attacks is driven by a combination of...

BT enhances its cyber capabilities in Europe

BT has announced the opening of a new Cyber Security Operations Centre (Cyber SOC) in Paris, as well as announcing upgraded facilities, new customer solutions and recruitment at its existing SOCs in Madrid and Frankfurt. BT’s global network of Security Operations...

read more

Demystifying cloud cybersecurity

With the rise of edge data centres and an increase in cloud-based computing, companies are facing new challenges in end-to-end cybersecurity. To ensure proper protection, data centre teams must now assess both internal processes and strategies used by cloud suppliers....

read more

Eset is Canalys cybersecurity champion

Eset has achieved Champion status globally for the first time in Canalys Cybersecurity Leadership Matrix 2019. Canalys is a leading global technology market analyst firm with a channel focus; it strives to guide clients on the future of the technology industry and to...

read more

Building a zero trust environment

People are the new perimeter and identity is at the very core of maintaining a secure, trusted environment. New technologies and trends, including the mobile workforce, BYOD, IoT, digital transformation, and the consumerisation of IT, are shifting identity and access...

read more

Unseen cloud threats exposed

Check Point Software Technologies has announced the release of CloudGuard Log.ic, a solution which delivers cloud-native threat protection and security intelligence. Using CloudGuard Log.ic, customers can now see every data flow and audit trail in today’s elastic...

read more

AI in cybersecurity – friend or foe?

It’s no news that advances in AI and machine learning have enormous transformative potential for cybersecurity defences. Simon McCullough, major channel account manager at F5 Networks However, rapid advances in technology also result in big opportunities for hackers...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>