<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

The invisible workforce: why household apps have their own digital IDs

Most people understand what it means to protect a human identity because the dangers of someone impersonating you online or stealing and cloning your card are immediately obvious. By Richard Ford, Group chief technology officer of Integrity360 Today, organisations...

Check Point to integrate AI Defense Plane with Google Cloud

Check Point Software Technologies will serve as a launch partner with Google Cloud to integrate Check Point's AI Defense Plane with Google Cloud's Gemini Enterprise Agent Platform. The integration combines centralised agent control with contextual intelligence and...

Man in the middle – the silent threat hiding in encrypted traffic

For most South Africans, the padlock in a browser bar feels like a seal of trust. It’s a comforting sign that says, “Your connection is secure”. But in the digital age, that confidence can be dangerously misplaced, writes Saurabh Prasad, senior solution architect at...

Rising to the era of AI-powered cyber defenve

The world of cybersecurity has fundamentally changed writes Anthony Grieco, senior vice-president and chief security & trust Officer at Cisco. Today, I’m proud to share that Cisco is joining the world’s most critical cyber defenders to...

Brace for more ransomware in 2020

Ransomware has become big business, generating estimated annual revenues of $1-billion a year for malicious threat actors. The victims of ransomware continue to stack up as criminals develop new, more creative ways to infiltrate IT environments, seize data and hold...

read more

Security trends that will shape 2020

Conventional cybercrime and financially motivated and targeted attacks remain highly active.  According to the Oracle and KPMG Cloud Threat Report 2019, a growing trend to target business-critical services and applications is highlighting a growing trend which many...

read more

Reinventing network camera security

Now in its seventh generation and celebrating its twentieth anniversary, the Axis ARTPEC chip was launched in 1999 designed to optimise network video. By Brendon Holl, sales manager: Africa at Axis Communications Today, it forms the basis for the essential product...

read more

Own your digital identity this summer

OThe arrival of summer is the perfect opportunity for young South Africans to log on to the worldwide web and claim their digital identities within the dotZA (.ZA) and dotAfrica (.africa) namespaces. “Schools are out and the youth are now able to turn their bright...

read more

Extending security to the cloud

Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances or as cloud services to protect the outer perimeter security in branch offices. Troye technical director Kurt...

read more

Mimecast challenges Shadow IT

Mimecast has announced the release of added application visibility and control capabilities to its Mimecast Web Security service. Application Visibility and Control will help Mimecast customers overcome the challenge of Shadow IT by uncovering cloud app usage within...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>