Encryption involves scrambling voice data during transmission to prevent eavesdropping and interception by unauthorised parties.
Escalated security functions prompt debate about CISOs’ reporting lines, says Bidvest Bank’s Nomonde White-Ndlovu.
While it remains an area of debate, cyber-specific insurance is increasingly being adopted by chief information security officers, according to survey findings.
Tools used by the modern security operations centre monitor activity continuously and flag any suspicious movements, says Dominic Richardson, CEO of Dolos.
Syrex will provide customers with the Seceon Open Threat Management Platform.
Rubrik Security Cloud, Microsoft Sentinel and Azure OpenAI Service integration lets companies strengthen their cyber resilience and recover faster from cyber attacks.
Trellix has detected a rise in cyber threats across South Africa’s economy.
The companies address the certificate management needs of organisations with automated solutions.
All implementation alternatives have advantages and disadvantages, which must be evaluated before deciding to adopt one or another deployment model, says Dominic Richardson, CEO of Dolos.
Monitoring cloud data and user activity for enhanced security.
Effective cyber security involves two main stages: incident response and crisis management, says Armand Kruger, head of cyber security at NEC XON Systems.