<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

The rise of the shadow employee

Imagine a marketing manager who left a company six months ago, taking their personal laptop with them. On it, unbeknownst to anyone, was a cached login to a shared cloud drive containing sensitive client proposals and campaign strategies – access that was simply...

Women aren’t just joining the cybersecurity industry, they’re redefining it

On 9 August, South Africa honours the women who, in 1956, marched in solidarity against injustice: 20 000 strong, united by courage and determination. Nearly seventy years later, their spirit endures, inspiring women in every sphere of life. By Jaya Khatri, HR...

Trend Micro, Google Cloud advance AI-driven security

Trend Micro has announced the expansion of its strategic alliance with Google Cloud, bringing together cybersecurity expertise and cloud innovation to secure the connected world through a multi-cloud, AI-first environment, supporting sovereignty requirements,...

An enterprise security perspective on skipping software updates

Is the humble software update the unsung hero of modern enterprise security? It certainly doesn’t get the attention it deserves. By Valencia Karageorgiades, Technology Architect at SAP Africa  Modern security teams are consumed with identity and access management,...
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>