Jun 6, 2025
Phishing, vishing and smishing attacks have increased significantly, leveraging advanced technologies and personalised tactics to deceive individuals and organisations. By John Mc Loughlin, CEO of J2 Software These threats exploit personal information, such as names,...
Jun 6, 2025
Artificial intelligence (AI) has now made it possible to wake up to a video of your CEO seemingly admitting to fraud or receiving an urgent audio message from your chief financial officer authorising a large, unexpected transaction, without any of it being real. By...
Jun 6, 2025
Responsibility for cybersecurity and data resilience can no longer be placed on the shoulders of chief information security offices (CISOs) alone. By Andre Troskie, EMEA field CISO at Veeam New EU regulations like NIS2 and DORA bring corporate accountability to the...
Jun 6, 2025
As organisations navigate an increasingly complex digital landscape, the convergence of cybersecurity and Environmental, Social, and Governance (ESG) principles has emerged as a critical consideration. By Ryan Boyes, governance, risk and compliance officer at Galix...
Jun 6, 2025
Leaders often assume that delegation equals empowerment, only to be frustrated when delegated tasks end up back on their desks after some time. By Juanita Vorster, independent business advisor Unfortunately, more often than not, what is perceived as delegation is...
Jun 6, 2025
Citrix environments are foundational to delivering virtual applications and desktops to a diverse and global workforce. However, the intricate nature of these deployments – spanning on-premises, hybrid, and multi-cloud architectures – can lead to...