As an independent advisor and former CISO for the University of Manchester, Heather Lowrie has led through high-pressure ...
Attracting consumers and expanding businesses modernly depend on financial advertising.
An effective cybersecurity strategy that includes critical pillars of cyber resilience, such as embedding security into the ...
With internet service providers playing a role in the ‘supply chain’ of cyber crime, leading Philippine fiber broadband and ...
Breaking down eight cyber security myths in SA businessesIssued by OpenTextJohannesburg, 12 Feb 2025Visit our press officeKobus Robinson, Lead Solutions Consultant at OpenText. (Image: OpenText) As ...
Cyber Threat Intelligence, Common Vulnerabilities and Exposures, Geodata, Land Administration Systems, Risk Assessment, Spatial Cadastral Data Share and Cite: Blin, P. , Aditya, T. , Santosa, P. and ...
Chief Technology Officer at Deimos, Jaco Nel, speaks with LAOLU AFOLABI about Africa’s rising cyber threat landscape. The CTO of the leading hybrid/multi-cloud professional services company ...
To mitigate some of these incidents, President Michael Drake instructed each UC campus to prepare a comprehensive ...