<center><ins data-revive-zoneid="105" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Cyber security still the dominant risk

The cybersecurity landscape has matured: attack vectors have evolved and adapted to changing security protocols and parameters with ransomware and online fraud becoming a menace in the region. However, this maturity also extends to the organisation as the strategies...

Data protection must become part of an organisation’s culture

By Imraan Kharwa – For years the privacy sword of Damocles hung precariously over South African businesses, threatening severe consequences and penalties for non-compliance with the Protection of Personal Information Act, 2013 (PoPIA). Now, nearly a year since...

Step up your surveillance game with Seagate SkyHawk™

When looking for a hard drive to power your CCTV security network, a standard HDD won’t do the trick, as the need for always-on operational demand and high-definition images is simply too high. Surveillance drives are specifically focused on mass data and speed...

Building an entrepreneurship culture is key to success in SA

Although the need for a more entrepreneurial culture in South Africa was not created by the Covid‑19 pandemic and resultant lockdowns, it certainly raised awareness of the importance of entrepreneurship and significantly increased the urgency with which our country...

Low-code development drives greater efficiencies

The increasing appetite for automation is driving the need for a better way of developing software – and low-code tools are stepping up to the plate. Gartner defines a low-code application platform as “an application platform that supports rapid application...

Top cybersecurity predictions for the years ahead

Executive performance evaluations will be increasingly linked to ability to manage cyber risk; almost one-third of nations will regulate ransomware response within the next three years; and security platform consolidation will help organisations thrive in hostile...

Protect assets in the physical world before jumping into metaverses

As businesses explore the vast possibilities of the metaverse, it is essential to also consider the very real risks posed by virtual worlds of this dynamic space. This is according to the latest report from global law firm Baker McKenzie which provides key takeaways...

OT breaches drive need for better security

There is a pressing need to improve operational technology (OT) security, with 93% of OT organisations having experienced an intrusion in the past year, and 78% of them experiencing more than three intrusions. This is among the findings from Fortinet’s recent 2022...

Security best practices needed to maintain integrity at the edge

By George Senzere – Industry 4.0, IIoT, smart manufacturing; all buzzwords that we’ve been talking about for years.  Many of us have had visions of factory floors run by futuristic robots and drones reminiscent of sci-fi movies like iRobot. Well, it seems that...

How security leaders can prepare for change

As cybersecurity strategy, leadership and technologies continue to evolve, Gartner has highlighted three steps security leaders can take now to prepare for the emerging threat landscape over the next 10 years. “The rise of artificial intelligence (AI) is a...

Business looks to add value with hyperautomation

Robotic process automation (RPA) was 2021’s disruptive technology, with organisations realising the benefits of deploying bots to perform repetitive and tedious tasks. But, as is so often the case, companies want more. “We know the RPA market is booming,” says Brian...

<center><ins data-revive-zoneid="82" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>