As AI unleashes new threats, we need a new cybersecurity approach

Imagine coming to the end of a lengthy recruitment process, only to find out the candidate you’ve been dealing with during several rounds of in-depth interviews isn’t real. By Yash Pillay, sales engineer at Trend Micro In fact, the person you’ve just hired doesn’t...
How you could thrive without passwords

How you could thrive without passwords

The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals, writes By Kumar Vaibhav, lead senior solution architect:...
The role of advanced technologies in ransomware recovery

The role of advanced technologies in ransomware recovery

The threat of ransomware attacks looms large, compelling organisations to rethink their data management strategies. By Modeen Malick, principal systems engineer at Commvault As businesses increasingly adopt cloud technologies, the complexities of maintaining...

As crypto grows, don’t lose sight of security

As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security, writes Richard Frost, head of technology and innovation at Armata Cyber Security. The Consensus Web3 and Crypto Perception...
How you could thrive without passwords

Strategic partnerships play a role in municipal cybersecurity

Strategic partnerships are essential for enhancing cybersecurity in South African municipalities. By Kumar Vaibhav, lead senior solution architect: cybersecurity at In2IT As cyber threats evolve and become more sophisticated, local governments face significant...