By infiltrating third-party vendors, cyber criminals accessed larger organisations, says Ross Anderson, business unit manager at Duxbury Networking.
SlashNext offers a 360-degree protection suite that goes beyond traditional secure e-mail gateways, which struggle against modern threats, says J2 Software.
The average data breach takes over six months to detect and 77 days to contain.
Enterprises that prioritise IAM as part of their culture will mitigate threat actors who take advantage of weak passwords, vulnerabilities and misconfigurations, says Tarryn Maarschalk, head of Go to Market for Intelys.
Solution House Software's four-pillar approach addresses the legal and ethical challenges of the technology and ensures it delivers tangible benefits to its clients.
The Hawks arrest a 21-year-old man in connection with the alleged leaking of the 2024 matric results.
It’s important to understand the nuances of fundamental identity and access management strategies in South Africa’s major industries.
The 2025 Masterclasses will cover topics like routing, switching, surveillance, wireless and cyber security.
Commvault's Backup & Recovery for Active Directory Enterprise Edition enables automated, rapid recovery of the Active Directory forest.
As cyber security becomes increasingly complex, higher education institutions must know their strengths, vulnerabilities, opportunities and threats.
Motorola Solutions' Silent Sentinel Jaeger and Osiris long-range thermal cameras are designed to provide accurate detection capabilities in extreme environments.