News

IT professionals often don't grasp OT's unique operational requirements. In enterprise IT, rebooting a server is routine. In ...
Operational technology has an identity problem. Here's how digital twins and knowledge graphs can help leaders spot—and ...
Adam Miller, deputy director of the Office of Information Security and Cyber Defense, breaks down how it will centralize ...
A breach in connected devices or automated decision-making have risky consequences. Q&A with Dr Francesca Boem ...
Companies to roll out a complete portfolio of cyber security solutions and services across SA and the SADC region.
Advanced Attack Vectors. GenAI faces threats like prompt injection (manipulating model behavior), data poisoning (tampering with training data), and model extraction (stealing proprietary capabilities ...
Speaking to the iTnews Podcast, head of cyber security and IT resilience Nathan Morelli said that this year is the first time ...
Rethinking security as a growth enabler can streamline processes and even help firms meet sustainability goals, says Zscaler ...
As hybrid work becomes the norm, government agencies must adapt their HR and payroll processes to support a more flexible and ...
As part of the 2025 cohort, Lumu joins a select group of companies driving critical innovation in cybersecurity, artificial ...
The Ministry of Railways’ information technology (IT) backbone — the Centre for Railway Information Systems (CRIS) — has ...
Why CISOs Must Urgently Prepare for the Collision of AI-driven Threats and Quantum Decryption Risks In the next five to seven ...