Embracing identity-centric zero trust: A glimpse into the future of the modern cyber security perimeter
Identity-centric zero trust builds on zero trust principles, making user identity the new perimeter, says Michael de Neuilly Rice, cyber security architect at NEC XON.
Building a framework for effective, agile endpoint security
Agile endpoint security measures, which can adapt quickly to the changing attack landscape, are paramount for ensuring an effective first line of defence, says Gideon Viljoen, pre-sales specialist: ICT security at Datacentrix
Industrial control systems cyber threats and the Gulf region Part 1
The SANS course, ICS515: ICS Visibility, Detection and Response, meets several modern ICS security challenges head-on, says Dean Parsons, SANS Certified Instructor.
City of Ekurhuleni warns of social media jobs scam
The city cautions the public not to respond to offers of employment on social media, stressing that their positions are strictly advertised on official channels.
Leveraging expertise in cyber security: A conversation with Rimmon Kisten of ICON Information Systems
The company's objective is to empower businesses with robust tools and strategies to safeguard against digital threats, says Rimmon Kisten, founder and MD of ICON Information Systems.
Inspired Testing, Risk X collaborate for seamless software security
Under this partnership, Inspired Testing will offer Risk X's cyber security and penetration testing services to clients looking to strengthen their cyber security posture.