Sep 18, 2025
Passwords provide access to our digital identities, enabling us to bank online, order products, and communicate with potential customers via social media. A secure password, or even better, two-factor authentication, is therefore crucial for keeping your online...				
					
			
					
				
															
					
					Sep 17, 2025
The shift to remote work and cloud storage has rendered traditional security strategies, designed for a world of office buildings and centralised networks, ineffective. By: Kumar Vaibhav, lead senior solution architect: cybersecurity at In2IT With users working...				
					
			
					
				
															
					
					Sep 16, 2025
Biometrics, particularly face biometrics, continue to be adopted as a method of identity verification (IDV) across multiple sectors in South Africa. By Lance Fanaroff, co-founder and chief strategy officer of iiDENTIFii While the technology promises greater security...				
					
			
					
											
								 
							
					
															
					
					Sep 16, 2025
The 15th of March is etched in history as the day when Julius Caesar met his end at the hands of the senators of Rome, and it’s about to become even more significant. “Beware the Ides of March,” a soothsayer tells Caesar in Shakespeare’s play,...				
					
			
					
				
															
					
					Sep 15, 2025
Secure access service edge (SASE) is a powerful model for delivering security services closer to users and applications. By Nirav Shah and Andres Herrera at Fortinet But for many organisations, especially in healthcare, government, financial services, and defense,...				
					
			
					
				
															
					
					Sep 12, 2025
While there’s a lot of talk around attack surface management (ASM) it doesn’t always clarify for businesses how they should  approach this crucial matter. By Christo Coetzer, director and CEO at BlueVision Firstly, it’s important to emphasise that ASM not a technical...