<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

In fraud, we need to accept that seeing is no longer believing 

By Richard Ford, group chief technology officer of Integrity360, outlines this scenario: You answer the phone. It is your daughter. You know it is her because you recognise the panic in her voice. She has run out of petrol in an area she doesn’t know; her phone is on...

Using AI to protect data is crucial

The cybersecurity landscape is rapidly changing, with hackers increasingly utilising artificial intelligence (AI) to carry out sophisticated attacks on their targets, writes Hemant Harie, group chief technology officer at Data Management Professionals South Africa. To...

Axis Communications signs CISA Secure by Design pledge

Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling its commitment to upholding and transparently communicating the cybersecurity posture of its products. A voluntary pledge...

Kaspersky enables independent transparency, accountability assessment

Kaspersky has released Protection beyond detection: Why trust and transparency decide your cybersecurity future, a new whitepaper based on an independent transparency and accountability assessment of 14 leading cybersecurity vendors. Kaspersky emerged as one of the...

The growing costs of cybercrime

Modern enterprises face an onslaught of cyberattacks from many quarters and must not only be prepared to contend with the direct costs of potential breaches, but also with spiralling indirect costs, such as compliance fines and reputational damage. By Simeon Tassev,...

read more

Robots take up the cybersecurity fight

The massive surge in cybercrime, the ever-increasing number of threat vectors, and a critical skills shortage has left organisations feeling more vulnerable to cyberattacks than ever before. With exponentially more ransomware incidents being reported than there are...

read more

Look again at security automation

The sheer scale and pace of today’s cyber threats could prove overwhelming for the security department, outpacing its resources. Hila Meller, BT Security, Global Head of Sales shares BT’s own learnings on the top five things to consider for your security automation...

read more

Putting the safe into social.

In February 2021, the data from 500-million LinkedIn users was leaked by hackers. In June 2021, more than 700-million LinkedIn users had their data leaked and put up for sale. In June 2022, the FBI said that the fraud on LinkedIn posed a significant threat to the...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>