Companies should make use of two-factor authentication and choose an ISP that offers intrusion prevention services, says Andrew Wilson, CEO of LucidView.
Continuous threat exposure management provides a structured, iterative approach that allows companies to eliminate cyber risks, reveals industry expert.
SASSA plans to up cyber security after an investigation uncovers vulnerabilities in online applications for the Social Relief of Distress grant.
Westcon-Comstor helps businesses identify hidden cost savings while ensuring their Azure and M365 environments are secure and compliant.
ITWeb TV #SS24 Steve Jump, Custodiet Advisory Services
Recorded live at ITWeb Security Summit 2024, Steve Jump, director, Custodiet Advisory Services, provided ITWeb's Adrian Hinchcliffe with an update on the Security Summit Hackathon, the value these have in skills development and talent recruitment for companies and the start-up scene, as well as an overview of Secure by Design principles.
Because MFPs are complex embedded systems, they represent a risk to network and enterprise systems if they are not adequately protected.
Nick Black from vendor partner Tenable will outline steps needed to move from being a novice in cloud security to expert level.
Because they often require persistent access and operate without direct user intervention, service accounts can become security blind spots, says Eben van der Westhuizen, product manager at Blue Turtle Technologies.
AI-driven channel enablement and decision-making, as well as intensified focus on data, security and tighter partnerships, are among several trends identified by SA channel stakeholders.
Some 90% of surveyed SA SMEs have adopted digital payments, highlighting the shift to contactless transactions, says Mastercard.
This by-law is intended to regulate and not restrict the erecting of CCTV infrastructure on city structures, says the city.
The partnership aims to address the cyber security challenges faced by telcos and ISPs as they navigate digital transformation.