The partnership will see Cyberrey become the official distribution and channel development partner for Labyrinth in Africa.
Press release
Client content
Timeline
2025
June
- 2.
May
- 30.Cloud-native supply chain solution provider automates application security across its development environment with Veracode.
- 29.At the core of this alliance is Vicarius vRx, a full-stack vulnerability remediation and compliance platform designed for today’s threat landscape.
- 29.After a two-year research and testing process, UCLA selected and purchased a series of Nexsan E-Series Model E60 storage systems.
- 29.With the right ASPM tool, application security will shift from an overwhelming burden to a source of business acceleration.
- 28.PCI DSS v3.2 is a globally recognised set of security standards designed to protect cardholder data and applies to any company storing, processing or transmitting credit card information.
- 28.Cyber security innovator Guardz will be represented by Solid8 Technologies at the ITWeb Security Summit 2025.
- 28.Cox Automotive needed a new AppSec provider and a solution that was easy to use, learn and integrate.
- 27.Adaptiv’s solutions are powered by its global SD-WAN cloud network, which now includes gateways in Johannesburg.
- 27.On average, security operations centre teams receive nearly 500 investigation-worthy endpoint security alerts per week, according to Cybereason’s white paper.
- 26.This year's summit has over 80 speakers and panellists on the agenda.
- 26.Snode's AI- and machine learning-driven detection capabilities, built into a CTEM-aligned framework, enable real-time insights at scale.
- 26.UK-based identity security vendor partners with Cyberrey to empower African enterprises with unified, AI-driven protection.
- 26.The utility's security team selected Cymulate because it provides security control and threat validation as well as attack surface management.
- 23.HYAS Protect, HYAS Insight and DNSSight combine to bring the best of cloud-based cyber security and resiliency, on-premises visibility and deep investigation capabilities.
- 23.The case study reveals how criminal justice relies on strong cyber defences.
- 22.Cyberrey brings Hack The Box to Africa, empowering organisations with gamified, real-world cyber security training and strategic workforce development.
- 22.Globeleq overcame challenges with in-house security and threat validation with Cymulate.
- 21.Onum delivers true real-time visibility, context and control over data-in-motion, says Solid8 Technologies.
- 21.The collaboration aims to respond to and combat the region’s growing cyber threat landscape.
- 21.The Tenable white paper explains how manufacturers first began using computer systems to manage and control production processes.
- 20.Owning your storage infrastructure means clear budget predictability, asset value and performance control, says Nexsan.
- 20.Radware supports a network of more than 50 cloud security service centres worldwide with a mitigation capacity up to 15Tbps.
- 20.Geopolitics, growing threat surface and AI tech drive bigger, longer, more intense attacks.
- 20.Raiffeisen Bank International, based in Austria, deployed Cymulate's security detection validation tool.
- 19.There are significant flaws in existing deepfake detection tools and a growing demand for solutions that are more adaptable and resilient.
- 19.The 2025 E-commerce Bot Threat Report details rise in bot attacks, emerging threat vectors and shifting defence strategies.
- 19.The partnership aims to deliver real-time detection of suspicious behaviour and deep correlation across DNS, DHCP and Active Directory logs.
- 16.CASA Software and Veracode will be on hand at this year’s ITWeb Security Summit to discuss AI and the future of application security testing.
- 15.At this year's ITWeb Security Summit, Obscure Technologies and partner Okta will discuss the challenges of the digital economy and how they can be met.
- 15.The company will expand on a case study at this year's summit.
- 15.Nexsan solution, Assureon, has patent-pending technology that protects and assures the integrity of information assets that it has archived.
- 14.GenAI-based security technologies can help surface higher priority risks and drive automated response procedures.
- 13.Solid8 and AlgoSec present their newly formed partnership at the summit, forged in response to the unexpected closure of Skybox Security earlier this year.
- 13.Championing partner success, empowering enterprise resilience and transforming cyber security across Africa.
- 13.At the summit, Cymulate will highlight the importance of validating cyber security defences before attacks take place.
- 13.Rubrik DSPM offers seamless deployment and comprehensive data visibility, eliminating the need for manual data discovery, says Obscure Technologies.
- 13.The line between authentic and manipulated evidence is blurring and the challenge of proving authenticity is crucial.
- 12.The platform enables real-time detection of malware infections, attribution of attacker campaigns and retrieval of exfiltrated data.
- 9.Risk Manager’s risk remediation dashboards track progress across applications and business units to highlight critical metrics.
- 9.The Hackensack Radiology Group in New Jersey, USA, has implemented Nexsan’s Assureon solution.
- 8.Security and DevOps teams face a growing number of entities to secure as companies adopt cloud-native approaches, says Obscure Technologies.
- 8.Threat intelligence is data that has been collected, analysed and enriched to help organisations make decisions.
- 8.Ransomware as a service is a business model where ransomware operators and third parties work together to launch ransomware attacks.
- 8.An Arctic Wolf survey looks at CISOs’ security challenges in the cloud and how managed service providers can help.
- 8.Cymulate showcases four best practices to take control of your CTEM at ITWeb Security Summit 2025, in Cape Town.
- 8.At least seven out of 10 organisations believe their sensitive data was compromised or breached in the past 12 months.
- 8.Arctic Wolf believes two forces will exert influence on tomorrow’s threat landscape: adversaries’ ability and willingness to adapt, and their propensity for financial gain.
- 7.Without robust security measures in place, AI infrastructure remains vulnerable to threats such as data leakage or fraud, says Arctic Wolf.
- 7.Read the full case study on this implementation here.
- 7.The report focuses on cyber attacks that escalated to a level requiring an incident response investigation by Arctic Wolf.
- 7.A proactive approach to cyber security drives significant business value beyond the prevention of financial and reputational damage from cyber incidents, says Gilchrist Mushwana, head of cyber security at BDO South Africa.
- 6.The Nedbank cyber security team wanted to replace its manual, resource-heavy cyber security processes to improve its protection from the latest active threats.
- 2.Solid8 will showcase Saviynt’s Identity Cloud platform – a solution designed to future-proof digital ecosystems in an age of AI-driven threats.
- 2.SURF enables companies to gain deep visibility and control over browser activity, whether users are on managed or BYOD devices, working from the office or remotely, accessing corporate SaaS or internal web apps.
April
- 30.The collaboration aims to deliver secure browsing solutions that safeguard data integrity, privacy and productivity in an increasingly complex threat environment.
- 30.The companies will highlight one of Nexsan’s global customer success use cases at the California Institute of Technology.
- 29.Companies need a high-density and energy-smart storage solution.
- 25.The partnership will focus on equipping African companies with tools to defend against identity-based cyber attacks, which are increasingly targeting Active Directory.
- 25.An identity security fabric is a unified framework for securing, managing and governing both non-human and human identities across ecosystems at scale.
- 25.Auth for GenAI, part of the Auth0 Platform, is a suite of features that enable developers to integrate secure identity into GenAI applications.
- 24.Companies will gain access to LimaCharlie's SecOps Cloud Platform, which delivers core cyber security capabilities as flexible, on-demand services.
- 24.Discover Armata Cyber Security’s AI-powered services at ITWeb Security Summit.
- 24.The Businesses at Work report analyses anonymised data across thousands of customers in the Okta Integration Network.
- 24.Okta provides a unified approach to securing service accounts and other non-human identities, ensuring they receive the same level of governance, security and control as human identities.
- 23.Cyber security in the age of AI is a key topic for the forthcoming ITWeb Security Summit, to be held in Cape Town and Johannesburg.
- 16.The companies will showcase Tenable's AI-powered exposure management platform at this year's ITWeb Security Summit.
- 16.Nexsan Assureon, when integrated with Unity, provides immutable storage, ensuring that data remains unchanged and secure from tampering.
- 16.Exposure validation helps companies to go further than traditional BAS and automated penetration testing solutions.
- 7.Obscure Technologies is a platinum sponsor at this year’s ITWeb Security Summit, and will showcase its global zero trust data security partner, Rubrik.
- 4.A comprehensive toolkit for safeguarding data has become non-negotiable in a world where secure immutable storage can be the first and last line of defence, says Byron Horn-Botha, senior sales specialist at CASA Software.
March
- 31.Cybereason’s MDR solution is a fully managed detection and response security solution that provides proactive threat hunting, detection and remediation.
- 26.Detection and response solutions have advanced to address the constantly evolving sophistication of cyber attacks.
January
- 16.This year marks the 20th anniversary of the annual ITWeb Security Summit, an event that has evolved alongside technology trends shaping the future of cyber security.