As ransomware and phishing attacks continue to rise in Africa, the cost of not investing in strong endpoint controls has become too high to ignore, says Datacentrix.
Security isn’t a product you buy, it’s a habit you develop, says Anton van Rooyen, Microsoft Certified Trainer and Cloud Solutions Expert, CTU Training Solutions.
The swift adoption of GenAI by end-users has outpaced the development of data governance and security measures.
While enterprise attention is on how to leverage AI, it’s vital that the basics of identity and access management are still followed.
Security must evolve from a perimeter conversation to an information conversation, says OpenText.
The ultimate goal of a romance scam is to gain the victim’s trust and steal their money or identity.
Initially designed to protect users from web threats, enterprise browsers are rapidly developing into full security systems.
Forrester's Allie Mellen, the BBC's Joe Tidy and 'comedyhacker' Tobias Schroedel will take centre stage at the Security Summit.
The fundamental problem isn't people but how they are prepared for security, says Cyber Dexterity.
Companies must be capable of detecting malicious DLLs and vulnerabilities in software libraries to prevent early-stage compromise, says Andrzej Jarmolowicz, operations director at Cybershure.
As data flows increasingly through cloud, AI and hybrid work, traditional data loss prevention tools can’t keep up, says Fortinet.