General | November 4, 2022Five worthy reads: What is at stake when deepfake technology is on the make? Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | April 22, 2022Five worthy reads: Is SSE here to overthrow SASE? Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | August 20, 2021Five worthy reads: Differential privacy—what it means for businesses Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | July 1, 2021Zoho's POPIA compliance statement The Protection of Personal Information Act (POPIA) comes into force from 1st July 2021....
General | April 16, 2021Five worthy reads: Location intelligence—the key to next-level data utilization Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | November 20, 2020Five worthy reads: The rise in credential stuffing attacks Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | August 28, 2020Five worthy reads: Ethical AI: Why is it the need of the hour? Five worthy reads is a regular column on five noteworthy items we have discovered while...
General | May 8, 2020Five worthy reads: Multiexperience: The next milestone in the digital transformation curve Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | April 15, 2020COVID-19 sets the stage for cyberattacks: How to protect your business while working remotely Businesses are shifting their operations to a remote work model in the midst of the...