<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Your cybersecurity strategy is probably wrong – and how to fix it

Recently, I asked a room full of business leaders who among them would rate their cybersecurity posture as "excellent”. Only one hand went up. When I dropped the ranking to "good," just a few more hands were tentatively raised. By Kudakwashe Charandura, head of...

How to delete your digital footprint from the Internet

Users’ digital footprints have been building up for years. Social media accounts, old comments, carelessly posted photos, message boards, and old marketplace listings — everything that each individual user has ever shared online remains there, potentially causing...

The autonomous security revolution: Why businesses are taking to the skies

For decades, security operations have relied on a familiar combination of fixed cameras, perimeter fencing and human patrol teams. By Ruan Botha, DJI project manager at Rectron While these remain important, they have inherent limitations. Static cameras create...

Cybersecurity – ignore it at your own peril

When a company as established as Jaguar Land Rover finds itself brought to a standstill by a cyberattack, it sends shockwaves through the entire business community. By Nickey Mannya, director for cybersecurity and next generation solutions at Westcon-Comstor Southern...
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>