Everyone should think like a hacker

Relevant cybersecurity isn't perpetuated exclusively through investment and systems, it is reliant on people and their understanding of the cyber threat. A leading ethical technology hacker in Europe, Jamie Woodruff, gained access to a well-known financial institution...

Successfully managing risk in a digital world

At a time when IT staff need to deliver on the backup, recovery, and business continuity needs of organisations, decision-makers must be able to successfully manage risk. By Kate Mollett, regional manager for Africa at Veeam In South Africa, the recent launch of...

Identity and access management has business on high alert

Identity and access management (IAM) is now a must in commerce and the need to protect digital assets (most notably data) is driving the development of solutions and widespread adoption, irrespective of the size of the business. Paul Chari, principal consultant EDC...

Productivity, innovation in manufacturing calls for better risk management

With manufacturing focused intensively on innovation, combined with a reliance on connected networks and products, it is an industry that is highly vulnerable to cyber attacks. Yet, the manufacturing industry remains fragmented in its approach to managing...

Will our votes be protected?

South Africa's eligible voters cast their ballots in national and provincial elections on the 8th of May 2019. Although there are many internal and external factors that may affect the results, a more pressing security concern for the Independent Electoral Commission...

read more