<center></center>

The battle to defend the 5G attack surface

As 5G coverage expands in South Africa, a world of new possibilities unfolds for both individuals and businesses. With the ability to connect more smart devices than ever before, the potential for innovation and growth is limitless. However, this rapid expansion also...

Outage highlights high stakes cloud risks

South Africans recently experienced sluggish internet speeds or breaks in connectivity as a result of multiple undersea cable breaks. While this was frustrating when people were trying to access their company networks, it became even more challenging for anyone using...

How to safeguard essential business data against emerging threats

The evolving nature of cyberattacks pose a constant threat to organisations, and staying up-to-date with the latest technology is no longer sufficient to ensure security. By Aslam Tajbhai, solutions architect at DMP South Africa With the emergence of artificial...

Access to data must be balanced with security in a borderless world

Before the internet, businesses tended to operate in smaller areas and in a very siloed manner. Today, however, there is a global online economy, and the geographical boundaries that limited business operation areas have fallen away. By Ryan Boyes, governance, risk...

What is data encryption?

Keeping information from unauthorised eyes is a practice as old as recording information. Regents would add their seal into wax to stop snoops from reading orders. Warring nations spend great expense and effort to break the codes of their opponents. And in the modern...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>