Modern business security: The power of unified cloud protection
SSE brings security closer to users and applications, allowing proactive threat detection, real-time monitoring and rapid response to potential security incidents, says John Mc Loughlin, CEO of J2 Software.
The interconnectedness of systems and the rapid adoption of new technologies has further complicated the task of securing companies, says Len Noe, technical evangelist and white hat hacker at CyberArk.
Embracing identity-centric zero trust: A glimpse into the future of the modern cyber security perimeter
Identity-centric zero trust builds on zero trust principles, making user identity the new perimeter, says Michael de Neuilly Rice, cyber security architect at NEC XON.
Building a framework for effective, agile endpoint security
Agile endpoint security measures, which can adapt quickly to the changing attack landscape, are paramount for ensuring an effective first line of defence, says Gideon Viljoen, pre-sales specialist: ICT security at Datacentrix
Industrial control systems cyber threats and the Gulf region Part 1
The SANS course, ICS515: ICS Visibility, Detection and Response, meets several modern ICS security challenges head-on, says Dean Parsons, SANS Certified Instructor.
City of Ekurhuleni warns of social media jobs scam
The city cautions the public not to respond to offers of employment on social media, stressing that their positions are strictly advertised on official channels.