Overcoming legacy systems for public security

When considering cybersecurity and data protection in the public sector, it is essential to acknowledge that the government faces critical challenges navigating the regulatory framework for data privacy and compliance. By Sarthak Rohal, senior vice-president at In2IT...

Is AI a game-changer for cyberthreats in Africa?

As the African continent continues its digital transformation, cybercriminals are becoming increasingly sophisticated, with AI emerging as a tool for more strategic and effective attacks – including distributed denial-of-service (DDoS) strikes. Bryan Hamman,...

The rise of autonomous data recovery

Escalating cyber threats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss. By Modeen Malick, principal systems engineer...

Integration is the key to smarter surveillance

Security threats are evolving and businesses in South Africa can no longer rely on standalone surveillance systems, writes Leandro da Cunha, surveillance business unit lead at Duxbury Networking. According to recent market projections, the local security industry is...
DLP helps to enhance and empower cybersecurity posture

DLP helps to enhance and empower cybersecurity posture

DLP systems are preventing data leaks. It’s a rule of thumb. But DLP can do more than just that, writes Sergio Bertoni, leading analyst at SearchInform. DLP systems are the part of information security infrastructure. They monitor data in motion on endpoints and over...