How NEC XON Foiled a Human-Operated Ransomware Attack in Real Time
Survey Sheds Light on Children’s Cyber Secrets
South Africa’s Next Cybersecurity Frontier
Latest NETSCOUT Threat Intelligence Report Reveals Diverse DDoS Threats Across Southern Africa
Zambia’s Data Protection Commissioner Fully Operational, Enforcing Privacy Compliance
Unlocking the hidden potential of NetScaler
Inside the War Room: How SA’s Top Banks and Insurers Are Strengthening Cyber Defenses
Top 7 Reasons to Attend the BFSI Security Summit 2025
Cybersecurity lessons of the Adolescence series on Netflix
Cybersecurity in South Africa: A Practical Guide to Selecting the Right MSSP
© IT News Africa | All rights reserved.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |