Why enterprises are turning to Cohesity for cyber resilience

Why enterprises are turning to Cohesity for cyber resilience

Enterprise organisations face increasing data volumes, advanced cyberthreats, and higher demands for availability and recovery. Leaders are questioning whether current data resilience strategies can ensure security, governance and scalability without adding unnecessary operational risk or cost. A significant change has transformed the enterprise data resilience landscape. With Veritas’s enterprise data resilience capabilities available through Cohesity,…

Read More
What makes AI-powered phishing a potent cyber danger?

What makes AI-powered phishing a potent cyber danger?

AI-powered phishing has become the most virulent security threat to businesses. Threat actors are now using advanced generative models to create highly personalised and convincing emails that are capable of bypassing traditional security measures. Richard Frost | image supplied AI-powered phishing is now the dominant cyber threat The pervasiveness of the threat is recognised in…

Read More
Strengthening cyber resilience with Commvault

Strengthening cyber resilience with Commvault

Chantal De Jager is the new Commvault Brand Manager. In today’s rapidly evolving business landscape, cyber resilience has become more than an IT responsibility – it is a core business priority. With cyber attacks increasing in both frequency and sophistication, organisations are under greater pressure than ever to safeguard their data, protect mission-critical systems and…

Read More
Risk-ready vs risk-exposed: The cyber resilience divide

Risk-ready vs risk-exposed: The cyber resilience divide

Organisations are learning from experience, and are turning to AI and automation to accelerate resilience. Everyone talks about detecting and preventing cyber attacks, yet the headlines tell a different story. Prevention and detection alone aren’t enough. Even the world’s most sophisticated enterprises are suffering crippling disruptions that ripple from IT to the boardroom — and…

Read More
the new front line of cyber risk

the new front line of cyber risk

The cybersecurity industry has spent years perfecting how to defend laptops, servers, identities and APIs. Yet some of the most important systems in our lives, the industrial ones that keep society up and running, were never designed for cybersecurity at all. As they connect to modern networks, the stakes rise dramatically. These are the machines,…

Read More
Inside IIS’s compliance and cyber security platform

Inside IIS’s compliance and cyber security platform

Mauritz du Toit, CEO, IIS. Infotech Integrated Solution’s platform was created to give financial service providers a simpler, smarter and more sustainable way to meet Financial Sector Conduct Authority (FSCA) compliance requirements. Rather than scrambling annually to prepare documents, gather evidence and chase security findings, the platform fosters continuous readiness, integrating monitoring, cyber security, reporting…

Read More
ITWeb TV Biz: Black Friday! Cyber Monday! Pay here! Stop and breathe

ITWeb TV Biz: Black Friday! Cyber Monday! Pay here! Stop and breathe

ITWeb welcomed Ursula Pearson-Williams, Head of Fraud Intelligence at PayInc, to the studio to talk about online fraud, regulations and what every Black November buyer should know. #payinc #freaudawarenessweek #itwebtvbiz Digital payment solutions are becoming increasingly agile and capable, and in line with the instant expectations of South African consumers. Unfortunately, so is fraud. In…

Read More
Webinar to focus on securing passwords – still the leading cause of cyber incidents

Webinar to focus on securing passwords – still the leading cause of cyber incidents

Julien Berteraut Poor and compromised passwords remain a leading cause of cyber incidents worldwide, yet many organisations have not yet mastered the science of mitigating this risk. From weak and re-used credentials to compliance hurdles and endless help desk resets, poor password hygiene continues to leave organisations exposed to costly breaches, downtime and reputational damage….

Read More