The evolution of zero trust

Around 18 months ago, I was writing about the “endless journey” to zero trust, writes Dave Russell, vice-president: enterprise strategy at Veeam. I used the word “endless” because zero trust is a mindset rather than a product or a destination...
Why modern organisations need advanced endpoint security

Why modern organisations need advanced endpoint security

Security technologies have come a long way from the anti-virus and firewall solutions of the past. As data grows exponentially, traditional security measures are no longer effective. David Herselman, MD of inq South Africa Artificial intelligence (AI) is playing an...

Cybersecurity fatigue a growing risk in the age of AI-driven attacks

Although the tactics and technologies cybercriminals use have evolved over the past 20 years, phishing and other social engineering attacks are nothing new. But despite the significant amounts of time and money invested in cybersecurity training and awareness,...

Protect digital ID with phone number security

Phone numbers have evolved into essential identifiers, akin to personal IDs and crucial for logging into numerous online services ranging from social networks to banking apps. As such, control over these digits is pivotal, with their loss potentially leading to...
Digital world makes defending against more relevant

Digital world makes defending against more relevant

In a hyper-connected, always-on world, both citizens and businesses must develop robust, multi-layered cybersecurity strategies to combat the flourishing cybercrime ecosystem. By Michael de Neuilly-Rice, cyber security architect at NEC XON These illicit markets have...