News

Why Bring Your Own Devices (BYOD) and consultant access Is the weakest link in enterprise cybersecurity—and what to do about ...
According to the PwC 2025 Global Digital Trust Insights report, over 77% of business leaders plan to increase their cybersecurity budgets in the coming year.
North America’s Dominance: The IAM market in North America dominated the global landscape in 2017, representing more than 30% of the overall share. The prevalence of hardware-based identification ...
South Africa’s young people are born digital but that doesn’t mean they’re digitally secure. As millions of young people ...
While BYOD can still work, centralized control over devices—especially in strategic industries—may be a safer long-term ...
During Youth Month in South Africa, we must unite to equip the next generation with the tools to combat cyber threats. By fostering education and awareness, we can empower a resilient digital ...
Cinemo, a global leader in high-performance and automotive-grade multimedia playback, streaming, media management, connectivity, and cloud middleware, is pleased to announce that India’s leading SUV ...
DTResearch UEFI firmware applications are affected by a vulnerability that can be used in BYOVD attacks to bypass Secure Boot.
Many organizations embrace digital transformation without embedding security early on. Kevin Robertson, CTO and co-founder of ...
In a surprising move, China-based DJI, the world’s largest drone manufacturer, is not flinching at the prospect of tighter ...
Here’s the scene: I’m at the 2025 RSAC Conference, in a session about home network security. Some of it is complicated—layers ...
“We are officers from Homeland Security.” ICE is a a federal law ... He called the action “a public policy mistake” and accused ICE of “taking over a state agency with federal force.” ...