Cyberrey’s Noko Terrence Tuwe will explain why integrating exposure management with real-time breach intelligence is critical at ITWeb Security Summit JHB 2026.
A limited number of customers were directly affected, but implications for organisations relying on Next.js are significant, says Check Point.
Cyber attacks wreak havoc on the financial, healthcare, retail and e-commerce sectors, severely damaging reputations and life-critical missions.
The API solution delivers secure e-mail gateway grade protection, including URL inspection, malware sandboxing and behavioural AI, without infrastructure changes.
The companies that handle incidents well are those that knew what they had before the incident happened, says Ben van Niekerk, business development executive – cyber security at Faranani DocTec.
When it comes to cyber security, doing nothing is not a neutral position; it poses substantial risks, says Simone Santana, MD at Solid8 Technologies.
Tech professionals weigh in on issue adding complexity to cyber security resilience and management.
The Polmed medical aid received a direct claim of a breach from a threat actor on 25 March, the principal officer reveals.
No consumer data was breached after files allegedly containing sensitive payment system data appeared on the dark web, says Adumo.
The bank has been preparing for the possibility of client and company-related data being made public, which “now appears to have been published”.
ITWeb's ideathon gave participants skills and real-world insights ahead of June’s hackathon at the ITWeb Security Summit 2026.
Covert Copy, an invisible and indestructible copy of data for a higher level of cloud storage security, is available in SA through LOOPHOLD.