Businesses urged to strengthen security posture

Implementing a comprehensive approach to cybersecurity and data protection are the first proactive steps to strengthening the security posture of any business. Organisations such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework 2.0...

The evolution of zero trust

Around 18 months ago, I was writing about the “endless journey” to zero trust, writes Dave Russell, vice-president: enterprise strategy at Veeam. I used the word “endless” because zero trust is a mindset rather than a product or a destination...
Why modern organisations need advanced endpoint security

Why modern organisations need advanced endpoint security

Security technologies have come a long way from the anti-virus and firewall solutions of the past. As data grows exponentially, traditional security measures are no longer effective. David Herselman, MD of inq South Africa Artificial intelligence (AI) is playing an...

Cybersecurity fatigue a growing risk in the age of AI-driven attacks

Although the tactics and technologies cybercriminals use have evolved over the past 20 years, phishing and other social engineering attacks are nothing new. But despite the significant amounts of time and money invested in cybersecurity training and awareness,...

Protect digital ID with phone number security

Phone numbers have evolved into essential identifiers, akin to personal IDs and crucial for logging into numerous online services ranging from social networks to banking apps. As such, control over these digits is pivotal, with their loss potentially leading to...