CCTV on buses is a critical tool for enhancing safety, reducing risks and improving the overall efficiency of public transport systems.
True data privacy requires a proactive, holistic approach that combines clear policies, advanced tools and a commitment to transparency, says Blue Turtle Technologies.
By infiltrating third-party vendors, cyber criminals accessed larger organisations, says Ross Anderson, business unit manager at Duxbury Networking.
SlashNext offers a 360-degree protection suite that goes beyond traditional secure e-mail gateways, which struggle against modern threats, says J2 Software.
The average data breach takes over six months to detect and 77 days to contain.
Enterprises that prioritise IAM as part of their culture will mitigate threat actors who take advantage of weak passwords, vulnerabilities and misconfigurations, says Tarryn Maarschalk, head of Go to Market for Intelys.
Solution House Software's four-pillar approach addresses the legal and ethical challenges of the technology and ensures it delivers tangible benefits to its clients.
The Hawks arrest a 21-year-old man in connection with the alleged leaking of the 2024 matric results.
It’s important to understand the nuances of fundamental identity and access management strategies in South Africa’s major industries.
The 2025 Masterclasses will cover topics like routing, switching, surveillance, wireless and cyber security.
Commvault's Backup & Recovery for Active Directory Enterprise Edition enables automated, rapid recovery of the Active Directory forest.