Traditional security tools cannot match the scale, speed and complexity of current threats, Arctic Wolf advises.
The company will discuss how African organisations can secure, monitor and govern the behaviour of autonomous AI agents alongside the human workforce.
Continuous validation is not just a nice-to-have – it is the engine that makes continuous threat exposure management work.
AI companies are holding back models that could be used in cyber attacks, instead deploying them to build defence systems.
Cyberrey’s Noko Terrence Tuwe will explain why integrating exposure management with real-time breach intelligence is critical at ITWeb Security Summit JHB 2026.
A limited number of customers were directly affected, but implications for organisations relying on Next.js are significant, says Check Point.
Cyber attacks wreak havoc on the financial, healthcare, retail and e-commerce sectors, severely damaging reputations and life-critical missions.
The API solution delivers secure e-mail gateway grade protection, including URL inspection, malware sandboxing and behavioural AI, without infrastructure changes.
The companies that handle incidents well are those that knew what they had before the incident happened, says Ben van Niekerk, business development executive – cyber security at Faranani DocTec.
When it comes to cyber security, doing nothing is not a neutral position; it poses substantial risks, says Simone Santana, MD at Solid8 Technologies.
Tech professionals weigh in on issue adding complexity to cyber security resilience and management.
The Polmed medical aid received a direct claim of a breach from a threat actor on 25 March, the principal officer reveals.