<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

AI in cybersecurity: battleground or breakthrough?

The rise of artificial intelligence (AI) has transformed industries from healthcare to finance, but one area where its influence is both promising and perilous is cybersecurity. By Avinash Gupta, head of Centre of Excellence at In2IT Technologies On one hand, AI...

Cyber resilience moves from IT issue to board risk

Cybersecurity has shifted decisively from an IT concern to a core business risk, and South African organisations are feeling this change acutely. By Boland Lithebe, security lead for Accenture, South Africa The World Economic Forum’s Global Cybersecurity Outlook 2026...

In cybersecurity, the when is just now

Cyber-risk in South Africa is not an if anymore, it’s when the attackers get in and how equipped the company is to deal with it, writes Mohammed Pochee, product manager: security at Vox. A company can very easily find itself offline for more than a week. Attackers can...

Facebook cloning turns your profile into a weapon

Facebook cloning scams are continuing to rise, turning ordinary profiles and family photos into tools for fraud and social engineering, writes Richard Frost, head of technology solutions and consulting at Armata Cyber Security. Have you ever wondered what criminals...

Extending security to the cloud

Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances or as cloud services to protect the outer perimeter security in branch offices. Troye technical director Kurt...

read more

Mimecast challenges Shadow IT

Mimecast has announced the release of added application visibility and control capabilities to its Mimecast Web Security service. Application Visibility and Control will help Mimecast customers overcome the challenge of Shadow IT by uncovering cloud app usage within...

read more

Be awake to the deepfake

South Africa's Wireless Application Service Providers' Association is advising smartphone users alarmed by the 'deepfake' phenomenon that the expected promulgation of South Africa's Cybercrimes and Cyberbullying Bill is imminent. Furthermore, there are practical ways...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>