We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.
Nash Lewis. According to a salary and hiring report by the professional recruitment group, Michael Page, cybersecurity is one of the top in-demand technology jobs in South Africa. Cybersecurity is an issue of critical importance and companies are prioritising hiring talent with the expertise of putting safeguarding measures in place. In response to this, the Banking Sector Education and Training Authority has developed new occupational qualifications to address the growing need for formal qualifications related to cybersecurity in South Africa. Interest in cybersecurity understandably follows increased demand for advanced technology by customers, especially within the fintech sector. With more customers conducting online transactions, the risk for potential cyber-attacks has rapidly increa...
The reality of the cyber threats posed today is that many threat actors are not rogue operators acting on their own but are, instead, working as part of sophisticated and organised groups, collaborating with other groups within a wider ecosystem of specialists. These groups build significant financial resources over time, derived from the proceeds of commercially-driven attacks, or gathered as payment from states sponsoring or directly commissioning their activities. This is according to Yaroslav Rosomakho, Field CTO of Netskope, a global cybersecurity leader which is redefining cloud, data, and network security to help organisations apply Zero Trust principles to protect data. He explains: “Threat actors use these resources to improve their subsequent attacks, paying for infrastructure or...
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.