Organisations must ignore common myths and instead focus on embracing a proactive, integrated approach to safeguarding data ...
Breaking down eight cyber security myths in SA businessesIssued by OpenTextJohannesburg, 12 Feb 2025Visit our press officeKobus Robinson, Lead Solutions Consultant at OpenText. (Image: OpenText) As ...
Greater adoption of more sophisticated and stealthier AI-powered phishing presents a significant cybersecurity challenge for ...
Days after a significant cyber attack of unknown provenance caused significant disruption for users of emergent Chinese generative artificial intelligence (GenAI) model DeepSeek, persistent ...
We kindly ask all our members and visitors to familiarise themselves with our Code of Practice before attending techUK events and meetings. Click below for more details. The threat landscape is ...
The cyber threat towards the UK Government is “severe and advancing quickly”, according to a new report from the Government’s spending watchdog, with cyber resilience levels “lower” than Whitehall had ...
Minister of Women Affairs, Hon. Imaan Sulaiman- Ibrahim, has called on universities and higher institutions to integrate human trafficking awareness and migration literacy into their curricula as a ...
Human error has been blamed after a major energy retailer shared family violence victims' private details without their consent and came calling for unpaid power bills.
Throughout 2024, the most common type of security incident faced by companies was related to <a target=_blank href= ...
MINNEAPOLIS — Saturday is National Human Trafficking Awareness Day, and June Haskell is a survivor of human trafficking; the second-fastest growing crime in the US.. "I was assaulted ...
How to protect your business in 2025By Ross Anderson, Business Unit Manager at Duxbury NetworkingIssued by Duxbury NetworkingJohannesburg, 22 Jan 2025Visit our press officeRoss Anderson, Business Unit ...