Sep 28, 2023
From a technological perspective, microsegmentation of your IT security environment can be viewed as a way to identify, isolate and curtail the reach of any threat – even once it is in your network. In a cybersecurity context, microsegmentation is a framework...
Sep 27, 2023
Bad things happen. One day, that file you worked on is fine. The next, it’s gone – lost in a hard drive failure or perhaps a stolen device. Maybe the version you worked on has corrupted, and you need to recover an earlier file. Someone might have deleted...
Sep 22, 2023
In the aftermath of South Africa’s recent greylisting by the Financial Action Task Force (FATF), companies are now confronted with the imperative to address eight identified strategic deficiencies while simultaneously reducing their financial crime risk through...
Sep 22, 2023
Many still perceive cryptocurrency as a novel and unconventional form of currency. It operates within an environment that lacks the safety and regulation found in traditional financial systems. Just like the lawless days of the American Wild West, the crypto world is...
Sep 20, 2023
There’s no question that African businesses are being increasingly targeted by cyberattacks, with ransomware, spyware and backdoor incidents, as well as data leaks, becoming ever more prevalent. By Brian Smith, business unit manager at Datacentrix One such...
Sep 14, 2023
The evolving nature of cyberattacks pose a constant threat to organisations, and staying up-to-date with the latest technology is no longer sufficient to ensure security. By Aslam Tajbhai, solutions architect at DMP South Africa With the emergence of artificial...