ZTNA 2.0 inspects all traffic and enforces least-privilege access continuously, says Koobasen Moodley, Cybersecurity: principal security architect at NEC XON.
The 2026 summit follows a record-breaking 20th anniversary this year that featured over 80 expert speakers, including 11 international keynotes.
As cyber criminals ramp up the use of artificial intelligence to bypass security measures, Google becomes their latest victim.
The identity security company was named a leader in the Forrester Wave for Privileged Identity Management report.
Phishing accounts for more than half of the country’s cyber threats, double the global average, according to ESET research.
The messaging and video calling app introduces new safety tools and bans millions of accounts linked to scam centres.
The company reveals an incident involving a bad actor targeting its representative through a voice phishing attack.
ITWeb and MTN Business’s recent cyber security survey found companies' ability to respond to cyber threats should be tested through regular simulations.
The banking trojan tricks South African taxpayers with convincing SARS-themed phishing e-mails as filing season reaches its peak.
Reactive security methods are no longer sufficient to defend against the scale, speed and sophistication of new and emerging threats.
The High Court dismisses PRASA’s attempt to block a defamation lawsuit brought against it by one of its former senior employees.