Criminals are looking to exploit expanding sports betting and booming digital payments, says LexisNexis Risk Solutions.
As banks beef up security perimeters, criminals devise methods to beat the authentication protocols, quickly and effectively exfiltrating funds, says Entersekt.
Thousands of local businesses are sitting on CCTV infrastructure that could already be delivering real-time threat detection, faster response times and stronger protection.
Companies need tools that can handle the threats that are coming out tomorrow, says Augustine Tumi Mogashoa, IT and business continuity management specialist at ASQE.
Maxtec, a QBS Technology Group company, announces its new distribution partnership with Ivanti, operated by IVM EME.
As ransomware and phishing attacks continue to rise in Africa, the cost of not investing in strong endpoint controls has become too high to ignore, says Datacentrix.
Security isn’t a product you buy, it’s a habit you develop, says Anton van Rooyen, Microsoft Certified Trainer and Cloud Solutions Expert, CTU Training Solutions.
The swift adoption of GenAI by end-users has outpaced the development of data governance and security measures.
While enterprise attention is on how to leverage AI, it’s vital that the basics of identity and access management are still followed.
Security must evolve from a perimeter conversation to an information conversation, says OpenText.
The ultimate goal of a romance scam is to gain the victim’s trust and steal their money or identity.