Feb 13, 2025
DLP systems are preventing data leaks. It’s a rule of thumb. But DLP can do more than just that, writes Sergio Bertoni, leading analyst at SearchInform. DLP systems are the part of information security infrastructure. They monitor data in motion on endpoints and over...
Feb 12, 2025
The globe continues to become more and more connected, and just like legitimate organisations benefit from technological advances, this interconnectedness is allowing criminal and malicious networks to flourish too. By Anna Collard, senior vice-president: content...
Feb 11, 2025
Connectivity and automation have undeniably revolutionised the manufacturing sector, boosting efficiency and productivity. However, they have also introduced significant vulnerabilities, leaving the industry increasingly exposed to cybersecurity threats. By Andre...
Feb 7, 2025
Endpoint security is a critical pillar of cybersecurity, especially for South African businesses, which are becoming prime targets for cybercriminals. By Kumar Vaibhav, lead senior solution architect: cybersecurity at In2IT Endpoint security involves safeguarding...
Feb 7, 2025
In today’s digitally driven world, we are inundated with cyber scams, both direct and indirect, daily. As cybersecurity technology evolves to block traditional attacks, cybercriminals are increasingly turning to social engineering – manipulative psychological...
Feb 7, 2025
As the use of AI assistants in South Africa continues to grow, so do the risks. Zaheer Ebrahim, Trend Micro’s solutions architect for the Middle East and Africa, unpacks some of the emerging threats. The evolution of AI assistants over the past few years is nothing...