Jul 25, 2024
Around 18 months ago, I was writing about the “endless journey” to zero trust, writes Dave Russell, vice-president: enterprise strategy at Veeam. I used the word “endless” because zero trust is a mindset rather than a product or a destination...
Jul 22, 2024
Security technologies have come a long way from the anti-virus and firewall solutions of the past. As data grows exponentially, traditional security measures are no longer effective. David Herselman, MD of inq South Africa Artificial intelligence (AI) is playing an...
Jul 22, 2024
Although the tactics and technologies cybercriminals use have evolved over the past 20 years, phishing and other social engineering attacks are nothing new. But despite the significant amounts of time and money invested in cybersecurity training and awareness,...
Jul 19, 2024
Phone numbers have evolved into essential identifiers, akin to personal IDs and crucial for logging into numerous online services ranging from social networks to banking apps. As such, control over these digits is pivotal, with their loss potentially leading to...
Jul 19, 2024
As the digital payments landscape in Africa expands, the need for robust cybersecurity measures becomes increasingly urgent. By Omotayo Ogunlade, chief technology officer at Onafriq Trust and security are foundational to financial services, and as cybercriminals...
Jul 15, 2024
In a hyper-connected, always-on world, both citizens and businesses must develop robust, multi-layered cybersecurity strategies to combat the flourishing cybercrime ecosystem. By Michael de Neuilly-Rice, cyber security architect at NEC XON These illicit markets have...