You may be extending an open invitation to hackers to roam free on your company’s cyber networks, says Doctor Mafuwafuwane, practice manager at Logicalis South Africa.
While ChatGPT has game-changing capabilities, it is also amplifying threat actor toolkits, says David Hoelzer, fellow at The SANS Institute.
Microsoft uncovers Russian-based Midnight Blizzard is behind a phishing campaign that affected fewer than 40 global organisations.
The way you implement your PKI affects your compliance and level of trust, making it the cornerstone of a zero trust architecture.
The milestone reinforces the company's commitment to helping customers defend against the latest cyber security threats.
By implementing Netskope, companies can protect users from interacting with unknown and unmanaged SaaS applications.
Cyber criminals exploit new vulnerabilities before they can be patched, consistently outpacing the efforts of vendors, says John Mc Loughlin, CEO of J2 Software.
HYPR is proficient in providing a versatile and customisable authentication experience, says Patrick Assheton-Smith, CEO of Symbiosys IT.
Lenovo to feature CyberArk Endpoint Privilege Manager as the first identity security offering within its ThinkShield security portfolio.
Companies need to define the business problem of a possible cyber security breach, and recognise the need for multiple layers of defence.
Real-world cases of cyber attacks in SA will be examined, with valuable insights into endpoint security strategies provided.