How to securely manage your digital footprint

How to securely manage your digital footprint

Our expanding digital footprint, including what we share on social media and via email, places us at growing risk of identity theft, data breaches, and cybercrime. Managing your online presence is critical to safeguarding your privacy and security, and it is...
Olympic and Paralympic Games open new attack opportunities

Olympic and Paralympic Games open new attack opportunities

The Paris 2024 Olympics games are here, and for the first time since 2020, spectators are welcome to attend, with an influx of 15-million people expected to attend the events. As the world’s attention has turned to this prestigious event, experts and law...

Cybersecurity in the era of quantum computing

As quantum computing technology rapidly advances, businesses and governments around the world are facing a looming threat to their cybersecurity. By Amritesh Anand, vice-president and MD: technology services group at In2IT Technologies. Quantum computers, with their...
Evolving data challenges need evolving data protection solutions

Evolving data challenges need evolving data protection solutions

Managing data has become increasingly difficult and protecting it has never been more important. This is often a challenge, however, writes Graham Brown, regional manager of Commvault SA/SADC. With data being both moved to the cloud and repatriated as consolidation...
Address the security sprawl

Address the security sprawl

Many companies still consider cybersecurity a grudge purchase. What is worse, these businesses often only allocate the necessary funds after an incident or a regulatory change forces their hands. The normalisation of the hybrid work environment has certainly...
How AI empowers defenders and emboldens attackers

How AI empowers defenders and emboldens attackers

Artificial intelligence (AI) has profoundly influenced the landscape of cyber warfare, serving as a double-edged sword for both attackers and defenders. By Kumar Vaibhav, lead senior solution architect: cyber security at In2IT Defined as machines capable of mimicking...