The Portfolio Committee on Social Development urges the South African Social Security Agency to restore the offline Electronic Know Your Client verification system.
Avast is leveraging AI in its products to detect and block malicious behaviours that seek to exploit personalised data.
Government is “not organised to win” and needs a unified vision underpinned by technology to realise its digital ambitions, says commissioner Edward Kieswetter.
CCTV on buses is a critical tool for enhancing safety, reducing risks and improving the overall efficiency of public transport systems.
True data privacy requires a proactive, holistic approach that combines clear policies, advanced tools and a commitment to transparency, says Blue Turtle Technologies.
By infiltrating third-party vendors, cyber criminals accessed larger organisations, says Ross Anderson, business unit manager at Duxbury Networking.
SlashNext offers a 360-degree protection suite that goes beyond traditional secure e-mail gateways, which struggle against modern threats, says J2 Software.
The average data breach takes over six months to detect and 77 days to contain.
Enterprises that prioritise IAM as part of their culture will mitigate threat actors who take advantage of weak passwords, vulnerabilities and misconfigurations, says Tarryn Maarschalk, head of Go to Market for Intelys.
Solution House Software's four-pillar approach addresses the legal and ethical challenges of the technology and ensures it delivers tangible benefits to its clients.
The Hawks arrest a 21-year-old man in connection with the alleged leaking of the 2024 matric results.