Critical strategies for staying ahead of emerging cyberthreats

Over the past couple of decades, changes in the threat landscape have driven changes in how we design, implement, and manage security. By Doros Hadjizenonos, regional director: SADC at Fortinet Organisations have spent the last two decades updating their security gear...

One-size-fits-all approach not be enough to secure IoT

Securing the Internet of Things (IoT) is something which cannot be done with a one-size-fits-all approach – and every kind of connected object must be assessed individually. This is according to Steve Hanna, co-chair of the Trusted Computing Group’s (TCG)...

Cloud security must be prioritised

For many South African organisations, the cloud is becoming an indispensable part of the standard operating procedure required for the digital landscape. And, thanks to the arrival of multinational data centres in the country, more decision-makers are experimenting...

Cybersecurity: focus on your people, lose the siloes

Ask any South African company what their major headaches are right now, and chances are that security will be near the top of the list. By Daniel Lotter, head of innovation at Itec South Africa Not just the burglar bars and CCTV type of security, either: as cybercrime...

Digital transformation’s growing attack surface

Traditional business models need to be reimagined as digital transformation continues to enable businesses to innovate and find new ways to not only leverage data but keep abreast of customer’s evolving requirements. While this presents innumerable...