Cyber insurance is a company’s double-layer safety net

The cyber threat landscape has changed so dramatically over the last three years that businesses thato operate in today's digitally connected world need an effective risk management strategy, one that helps them identify and manage their business risks proactively....

Will our votes be protected?

South Africa's eligible voters cast their ballots in national and provincial elections on the 8th of May 2019. Although there are many internal and external factors that may affect the results, a more pressing security concern for the Independent Electoral Commission...

The difference between PAM and PUM

When it comes to breaches, there are many areas that attackers focus on to try and gain entry to a company's data. One that is often overlooked by the security team is privileged accounts. "While many companies manage their privileged accounts and credentials in the...

CFOs must ask critical IT investment questions

Chief financial officers (CFOs) need to take a more active role in the digital transformation of today's companies. With an increase in shadow IT, where departmental staff bring technologies on board without consulting the IT department, the CFO should be asking...