<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Is this the calm before the cyberstorm?

No one enters the cybersecurity sector expecting serenity. The pace is relentless, and the stakes are high. By Brendan Widlake, regional director of Veeam Software South Africa According to the World Economic Forum, the weekly number of cyberattacks has more than...

Shadow IT is a symptom of friction, not rebellion

The use of unapproved apps and systems inside an organisation, known as Shadow IT, is often viewed as a rebellious act by employees looking to break the rules. The reality is far more nuanced. Shadow IT is rarely malicious; it is usually a quite rational decision made...

Cybersecurity awareness is a behavioural discipline, not an IT project

An employee receives an email from a Gmail address asking for payslips. It feels routine, and without hesitation, the attachment is sent. Or the employee can pause, verify the sender, and confirm the request. This is just one of many similar moments that determine...

The AI-SOC paradox: High hopes confront implementation hurdles

Almost all companies planning to establish a Security Operations Centre (SOC) regard artificial intelligence (AI) as a must-have component. However, despite high expectations, organisations face significant challenges in deploying and operationalising AI effectively....
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>