AI, social media and surveillance – who has access to your face? 

Your face defines who you are, but in the age of AI and social media, your facial features can be used against you. This was seen with the recent Coldplay ‘kiss cam’ scandal, where social media users were able to uncover the offending CEO and the company’s Chief...

Mind your password – and other cyber vulnerabilities

Passwords provide access to our digital identities, enabling us to bank online, order products, and communicate with potential customers via social media. A secure password, or even better, two-factor authentication, is therefore crucial for keeping your online...

Addressing concerns over biometric authentication

Biometrics, particularly face biometrics, continue to be adopted as a method of identity verification (IDV) across multiple sectors in South Africa. By Lance Fanaroff, co-founder and chief strategy officer of iiDENTIFii While the technology promises greater security...

Sovereign SASE a new model for data-sensitive enterprises

Secure access service edge (SASE) is a powerful model for delivering security services closer to users and applications. By Nirav Shah and Andres Herrera at Fortinet But for many organisations, especially in healthcare, government, financial services, and defense,...