Securing The Supply Chain
Recently, my Editor-in-Chief penned an article asking whether we ought to spell it as cyber-security, cybersecurity or cyber security. Through…
Recently, my Editor-in-Chief penned an article asking whether we ought to spell it as cyber-security, cybersecurity or cyber security. Through…
Medicine. Aeronautics. Academia. When you’re a cybersecurity professional, the colleague next to you could have started in one of these…
The following QnA included both Schneider Electric, and Fortinet representatives. 1. It is a year since the partnership between Schneider…
The government is taking measures, including establishment of a permanent national committee to address challenges of cyber bullying, controlling fraud…
Africa is a continent that is experiencing a digital boom. It is growing quickly in terms of population, the economy,…
Sphos has, in a new research, exposed a fake pirated software delivering bundles of malicious and unwanted content to targets…
As the world begins to emerge from the pandemic, many changes have come to light. One of the most dramatic…
Local mobile network provider, Telekom Networks Malawi (TNM) has revealed that over 91 per cent of mobile money fraud cases…
Artificial intelligence (AI) technology is a powerful technology, and because of this, it holds great potential for exploitation by cybercriminals….
The full implementation of the Protection of Personal Information Act heralds a new era of control and privacy for South…
No more posts available. Thank you for scrolling this far.
No more posts available. Thank you for scrolling this far.