Nokia’s global head of security says communication service providers cannot overlook the critical importance of security.
Romance scams are prevalent schemes, where fraudsters create fake profiles on dating platforms or social media to build emotional connections with their victims.
CIS Hardened Images are software files that are preconfigured to align with the Center for Internet Security Benchmarks.
Round-the-clock security operations centres help keep clients one step ahead.
Defence-in-depth strategies, such as endpoint protection, network segmentation and regular employee training, are critical to staying ahead of attackers, says Kobus Robinson, lead solutions consultant at OpenText.
It is one of only two companies in South Africa to hold this certification.
Nihka Technology Group's AI-powered systems monitor for unusual activities, like accessing sensitive data during atypical hours, and trigger immediate investigations.
Cyber criminals are not only targeting the manufacturers themselves, but also suppliers, logistics providers and critical infrastructure, says Andre Froneman, OT solutions specialist at Datacentrix.
Effective global threat hunting relies on collaboration between teams, customers and stakeholders.
The ubiquitous use of personal cloud apps and GenAI tools require modern workplace security to mitigate risk, according to Netskope research.
Faranani DocTec introduces its cyber security solution, leveraging OpenText Cybersecurity Aviator to offer a layered security approach.