Mar 25, 2025
Imagine coming to the end of a lengthy recruitment process, only to find out the candidate you’ve been dealing with during several rounds of in-depth interviews isn’t real. By Yash Pillay, sales engineer at Trend Micro In fact, the person you’ve just hired doesn’t...
Mar 25, 2025
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals, writes By Kumar Vaibhav, lead senior solution architect:...
Mar 20, 2025
The threat of ransomware attacks looms large, compelling organisations to rethink their data management strategies. By Modeen Malick, principal systems engineer at Commvault As businesses increasingly adopt cloud technologies, the complexities of maintaining...
Mar 19, 2025
The recent compromise of one of the South African Parliament’s Youtube accounts, to promote a fraudulent “$Ramaphosa” cryptocurrency token, underscores the insidious nature of scammers impersonating trusted figures or institutions and abusing their...
Mar 18, 2025
As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security, writes Richard Frost, head of technology and innovation at Armata Cyber Security. The Consensus Web3 and Crypto Perception...
Mar 14, 2025
Strategic partnerships are essential for enhancing cybersecurity in South African municipalities. By Kumar Vaibhav, lead senior solution architect: cybersecurity at In2IT As cyber threats evolve and become more sophisticated, local governments face significant...