News

Effective cyber security requires context, vision, discipline, says Sasol boss By Christopher Tredger, Portals editorJohannesburg, 23 May 2025Lungile Mginqi, group CIO at Sasol. A good cyber security ...
A new generation of enterprise security frameworks is being developed–one that reacts to threats in real-time. Hassan Rehan, ...
As cyber threats grow more sophisticated and infrastructure becomes increasingly interconnected, traditional perimeter-based ...
Keeper Security, the leading provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software protecting ...
As cyber threats become increasingly sophisticated, traditional security models that rely on perimeter defenses are no longer sufficient. Zero ...
Fully managed Rackspace Cyber Recovery Service, powered by Rubrik, brings DevOps automation, immutable backups and Recovery ...
The business world is undergoing a profound transformation, driven by rapid technological advancement. At the heart of this transformation are two major forces reshaping workplace dynamics: the increa ...
To start filling the browser visibility gap with ZTNA principles on unmanaged devices, companies should manage access to ...
The Defense Logistics Agency has a tentatively approved ICAM until 2030, when they will integrate into the Defense Department ...
A “red teaming” exercise conducted in March by IT security consultancy Cyberis discovered that privileged access to One Login ...