Addressing concerns over biometric authentication

Biometrics, particularly face biometrics, continue to be adopted as a method of identity verification (IDV) across multiple sectors in South Africa. By Lance Fanaroff, co-founder and chief strategy officer of iiDENTIFii While the technology promises greater security...

Sovereign SASE a new model for data-sensitive enterprises

Secure access service edge (SASE) is a powerful model for delivering security services closer to users and applications. By Nirav Shah and Andres Herrera at Fortinet But for many organisations, especially in healthcare, government, financial services, and defense,...

For effective attack surface management, think like an attacker

While there’s a lot of talk around attack surface management (ASM) it doesn’t always clarify for businesses how they should  approach this crucial matter. By Christo Coetzer, director and CEO at BlueVision Firstly, it’s important to emphasise that ASM not a technical...
What if your staff’s AI chats are hacked?

What if your staff’s AI chats are hacked?

The rise of generative AI (GenAI) has changed how we work, live, and create. By Richard Ford, chief technology officer at Integrity360 For many employees, tools like ChatGPT and Copilot have become go-to assistants for everything from drafting emails and summarising...

Could gamification build better habits and protect users?

Traditional cybersecurity and compliance training can be dull as dishwater, which can lead to poor engagement and low retention among employees. Gamification, if done well, offers a refreshing alternative, transforming boring modules into interactive experiences that...