<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Shadow IT is a symptom of friction, not rebellion

The use of unapproved apps and systems inside an organisation, known as Shadow IT, is often viewed as a rebellious act by employees looking to break the rules. The reality is far more nuanced. Shadow IT is rarely malicious; it is usually a quite rational decision made...

Cybersecurity awareness is a behavioural discipline, not an IT project

An employee receives an email from a Gmail address asking for payslips. It feels routine, and without hesitation, the attachment is sent. Or the employee can pause, verify the sender, and confirm the request. This is just one of many similar moments that determine...

The AI-SOC paradox: High hopes confront implementation hurdles

Almost all companies planning to establish a Security Operations Centre (SOC) regard artificial intelligence (AI) as a must-have component. However, despite high expectations, organisations face significant challenges in deploying and operationalising AI effectively....

SA CISOs facing burnout epidemic. AI is the cause – and solution

South African CISOs are operating in a perfect storm. The rising volume and sophistication of attacks, constrained budgets, and a deepening skills shortage are adding to the mental strain of alert fatigue and the growing expectations from boards. While AI holds a...
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>