The company was responsible for safeguarding the security of the Independent Electoral Commission websites and infrastructure during this heightened period of activity.
This form of abuse severely affects a child’s identity and self-worth and often leads to long-term negative effects, says Candice Toprek, underwriting lead: personal cyber at iTOO Special Risks.
Understanding the different types of cyber bullying to create safer online spaces
The proliferation of social media and digital communication platforms has facilitated the spread of online bullying, says Candice Toprek, underwriting lead: personal cyber at iTOO Special Risks.
AI's double-edged sword requires human security approach
Defenders can harness AI for threat intelligence research, improved threat detection capabilities and streamlined incident response, says Adrian Stanford, CTO at ESET Southern Africa.
Transforming grid stability: The Macrocomm approach
Macrocomm's Geyser Controller Unit allows users to manage their geyser's operation by controlling on-off cycles and adjusting temperature settings via the smart app.
Justice department denies cyber attack, blames insiders
The suspension of the child maintenance e-payments system relates to potential fraudulent actions by insiders attempting to exploit the system, says the department.