Taking control of IAM in the AI era

Taking control of IAM in the AI era

CJ Oosthuizen, Google Cloud and Workspace specialist, Argility Technology Group. AI – and shadow AI – are proliferating, creating a series of new risks for organisations. To gain control of who and what is accessing corporate data, organisations need unified control planes designed to shed light on the entire environment. This is according to CJ…

Read More
IAM basics beyond the AI buzz

IAM basics beyond the AI buzz

Albert Steenkamp, information security specialist at Discovery. In a cyber security world, where much focus is on the different ways AI can be used to infiltrate systems or automate attacks, attention still needs to be paid to the basics of cyber security, says Albert Steenkamp, information security specialist at Discovery. “Everybody likes to put AI out there,…

Read More
Why SA businesses need highly-integrated IAM strategy

Why SA businesses need highly-integrated IAM strategy

Wehann Kritzinger, cyber security software specialist, iOCO South Africa. Businesses are faced with mounting pressure in the midst of global digital-first economies. South African organisations are not immune to this trend. With increasing cyber crime and stringent regulatory compliance mandates, such as the Protection of Personal Information Act (POPIA), managing how data is being processed…

Read More