Search for content, post, videos
Dark Data
0 COMMENT
3509 Views
Dark Data or Data in Darkness

Dark data can be defined as all the data that exists within an organization but is currently useless or unusable, either because it is redundant, forgotten, ignored, hidden, simply unknown to the organization at a given point in time, or which may be difficult to find, manage, or exploit for…

0 COMMENT
5416 Views
Generative AI and Data Privacy

What is Generative AI? Generative artificial intelligence (AI) is a category of AI tools that leverages complex algorithms to learn patterns and generate content that mimics human creativity. These tools have proven to be transformative, empowering individuals and organizations to create music, art, and other forms of media effortlessly. They…

PECB Awards Gala
0 COMMENT
1891 Views
Throwback to the First PECB Awards Gala

As we continue to celebrate remarkable moments in PECB’s history, we take a nostalgic journey back to the inaugural PECB Awards Gala. This prestigious event, held on June 29th, 2017, as part of the PECB Insights Conference 2017 in Montreal, Canada, brought together industry leaders, professionals, and organizations from around…

Blockchain Technology
0 COMMENT
3924 Views
Blockchain Technology and Cybersecurity – How It Can Secure Your Data and Transactions

Blockchain technology has gained significant traction in recent years, as the backbone of cryptocurrencies like Bitcoin. However, its potential applications extend far beyond digital currencies, presenting transformative opportunities for cybersecurity, data privacy, and transparency. As data breaches and cyber threats continue to rise, organizations and individuals seek innovative solutions to…

0 COMMENT
10884 Views
What is cryptography?

As a child, you may recall using symbols to write coded messages to your classmates that no one else could understand. More seriously, codes and ciphers are used for information security in computer systems and networks to protect sensitive and commercial information from unauthorized access when it is at rest…

South Africa’s water
0 COMMENT
2067 Views
Managing South Africa’s water for a better tomorrow

Renowned water expert sheds light on the many opportunities associated with sustainable solutions. In 2015, after two years of good rains, the Western Cape entered a period of severe drought. For the City of Cape Town, this was the start of a multi-year water crisis, the likes of which we…

certified
0 COMMENT
4464 Views
The IT and Security Leader’s Guide to ISO/IEC 27032

The threat landscape is constantly evolving. Cyberattacks are becoming more frequent or more sophisticated, therefore, organizations need to adopt modern practices to manage information security. The globally recognized standard ISO/IEC 27032 provides guidelines for those involved with managing cybersecurity in today’s digital era. The level of safety and security of…