Embracing identity-centric zero trust: A glimpse into the future of the modern cyber security perimeter
Identity-centric zero trust builds on zero trust principles, making user identity the new perimeter, says Michael de Neuilly Rice, cyber security architect at NEC XON.
Corridor Africa Technologies prepares for 2024 with sustainable infrastructure, energy-efficient solutions
The company foresees blockchain solutions being integrated into various aspects of telecoms operations, including billing, identity verification and network security.