Sovereign SASE a new model for data-sensitive enterprises

Secure access service edge (SASE) is a powerful model for delivering security services closer to users and applications. By Nirav Shah and Andres Herrera at Fortinet But for many organisations, especially in healthcare, government, financial services, and defense,...

Hidden ownership turns tax crime into an AI challenge

Tax evasion goes far beyond legal tax avoidance. It is the practice of illegally hiding income or profits to avoid paying tax, costing countries over $500-billion a year. In many cases tax evasion depends on opaque ownership structures that hide who really owns...

Telecom expense visibility the missing link in financial governance

For good reason, people, capital, and infrastructure are known as the pillars that hold up organisations. Now comes a modern pillar that is just as important: connectivity. Nobody would deny the need for extensive financial oversight in monitoring spending on people,...

Recognition for Check Point Software

Check Point Software Technologies has been recognised for the second consecutive year as one of the World’s Best Companies of 2025 by TIME and Statista. Check Point is featured on the list due to its strong employee satisfaction, revenue growth, and sustainability...

SA could leapfrog the world in EV adoption

Often perceived to be lagging behind the developed world, South Africa has a unique opportunity to not only catch up, but to leapfrog established markets like Europe and the USA in the long-term adoption of New Energy Vehicles (NEVs). By Linda Cele, products head key...

For effective attack surface management, think like an attacker

While there’s a lot of talk around attack surface management (ASM) it doesn’t always clarify for businesses how they should  approach this crucial matter. By Christo Coetzer, director and CEO at BlueVision Firstly, it’s important to emphasise that ASM not a technical...