News

The biggest security failures rarely stem from cutting-edge attacks. They happen because of mundane, preventable errors.
BY AMINA ALLISON Imagine receiving a video call. It’s your company’s chief financial officer, along with several ...
The Coast Guard is nearing the full implementation of new cybersecurity regulations that will enhance risk mitigation in ...
In today's rapidly evolving industrial landscape, organizations face critical challenges securing their Operational ...
Top cyber security threats and predictions for 2025By Gilchrist Mushwana – Advisory Director: Cyber security at BDO South AfricaIssued by ITWeb Security SummitJohannesburg, 14 May 2025More content ...
Real-time monitoring of AI behavior can detect deviations from expected behavior. A practical approach includes establishing ...
Cybersecurity expert Alok Sarkar has extensively analyzed the challenges of protecting critical infrastructure in an ...
As the cyber landscape continues to shapeshift at speed, there is a concerning disconnect between security capabilities and ...
Almost 1 in 4 UK universities are cutting staff, slashing budgets, or making redundancies. The last thing they need right now ...
Most governments struggle with replacing legacy systems for a variety of reasons. But some people claim legacy mainframes can be just as secure as modern ones. So how big is the legacy cyber threat?
A “red teaming” exercise conducted in March by IT security consultancy Cyberis discovered that privileged access to One Login ...
The process of patch management in modern healthcare is often met with a variety of obstacles. From budget constraints, to IT ...